Impact of Data Digitalization on Cybersecurity Challenges: A Report
VerifiedAdded on 2021/02/19
|11
|3405
|242
Report
AI Summary
This report delves into the cybersecurity challenges faced by businesses in the era of data digitalization. It begins with an introduction to research methodology, defining it as the tools and procedures used to gather and analyze in-depth information. The research question is framed around whether data digitalization has made cybersecurity challenges impossible to address. The methodology employed is primarily qualitative, focusing on subjective information and the use of theoretical frameworks to understand the topic. Both qualitative and quantitative research methods are discussed, with the study choosing qualitative due to its suitability for investigating complex issues and smaller sample sizes where outcomes are not quantifiable. The report utilizes secondary data from books, journals, and government sites to build understanding of the issues. Primary data collection involves the use of questionnaires, with a sample size of 10, employing a simple random sampling approach to minimize bias. The questionnaire design includes both open and closed-ended questions to gather detailed information. Data analysis is performed using thematic analysis to identify patterns and draw conclusions. The key findings are summarized, highlighting the increasing reliance on the internet and the challenges businesses face in this digital landscape.

BUSINESS RESEARCH
PROJECT
PROJECT
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................3
RESEARCH METHODOLOGY.....................................................................................................3
Summary of the key findings......................................................................................................7
CONCLUSION................................................................................................................................8
REFERENCES..............................................................................................................................10
INTRODUCTION...........................................................................................................................3
RESEARCH METHODOLOGY.....................................................................................................3
Summary of the key findings......................................................................................................7
CONCLUSION................................................................................................................................8
REFERENCES..............................................................................................................................10

INTRODUCTION
Research methodology can be defined as procedure or tools that ae used by scholar to gather
in-depth information about subject matter and analysing data in significant manner (Antwi and
Hamza, 2015). Present study is based on data digitalization made cybersecurity challenges
impossible to address for businesses. Report will describe various tools and techniques that are
helpful in answering research questions.
RESEARCH QUESTION
Has data digitalization made cybersecurity challenges impossible to address for businesses?
RESEARCH METHODOLOGY
Research techniques are helpful in critical evaluating subject matter and reaching to end
results where scholar becomes able to answer research questions effectively. Selection of correct
method of research helps scholar in completing investigation on time and with quality outcome.
There are various methods of research such as philosophies, approaches, designs, sampling, data
analyses, data collection etc. It is essential to have understand nature of each tool and then apply
it to the research that can support in getting desired results (Ndlovu-Gatsheni, 2017).
Qualitative and quantitative debate
Qualitative is the study where researcher conduct the investigation in subjective manner
and try to focus more on subjective information only. Scholar have to conduct investigation by
considering nature of research topic, qualitative and quantitative two major types of researches..
Individual takes assistance of theories and models in order to build understanding about topic.
One of the major reason of conducting research in qualitative manner is to gain insight
understanding about subject, by this way investigator can uncover trends and can answer the
problems in significant manner (Antwi and Hamza, 2015) . Qualitative researches are descriptive
and scholar uses graphs to present the data. It is non-numerical kind of study where each element
is described with proper reasoning. This method describes situation well and explain each factor
with proper justification. On other hand quantitative researches is another kind of researches
where scholar takes assistance of statistical tools such as calculi mean, mode, SPSS etc. in order
to reach to end results. Qualitative researches are being conducted in structured manner which
enhance reliability of results. It is numerical and also many mathematical calculations are
performed by investigator to reach to end results,. Scholar evaluate each evidence and try to get
Research methodology can be defined as procedure or tools that ae used by scholar to gather
in-depth information about subject matter and analysing data in significant manner (Antwi and
Hamza, 2015). Present study is based on data digitalization made cybersecurity challenges
impossible to address for businesses. Report will describe various tools and techniques that are
helpful in answering research questions.
RESEARCH QUESTION
Has data digitalization made cybersecurity challenges impossible to address for businesses?
RESEARCH METHODOLOGY
Research techniques are helpful in critical evaluating subject matter and reaching to end
results where scholar becomes able to answer research questions effectively. Selection of correct
method of research helps scholar in completing investigation on time and with quality outcome.
There are various methods of research such as philosophies, approaches, designs, sampling, data
analyses, data collection etc. It is essential to have understand nature of each tool and then apply
it to the research that can support in getting desired results (Ndlovu-Gatsheni, 2017).
Qualitative and quantitative debate
Qualitative is the study where researcher conduct the investigation in subjective manner
and try to focus more on subjective information only. Scholar have to conduct investigation by
considering nature of research topic, qualitative and quantitative two major types of researches..
Individual takes assistance of theories and models in order to build understanding about topic.
One of the major reason of conducting research in qualitative manner is to gain insight
understanding about subject, by this way investigator can uncover trends and can answer the
problems in significant manner (Antwi and Hamza, 2015) . Qualitative researches are descriptive
and scholar uses graphs to present the data. It is non-numerical kind of study where each element
is described with proper reasoning. This method describes situation well and explain each factor
with proper justification. On other hand quantitative researches is another kind of researches
where scholar takes assistance of statistical tools such as calculi mean, mode, SPSS etc. in order
to reach to end results. Qualitative researches are being conducted in structured manner which
enhance reliability of results. It is numerical and also many mathematical calculations are
performed by investigator to reach to end results,. Scholar evaluate each evidence and try to get
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

reliable and authentic results. Furthermore, quantitative researches uses tables to present data so
that results can be interpreted in effective manner. Furthermore, it is conclusive in nature (Antwi
and Hamza, 2015).
In the current research on data digitalization made cybersecurity challenges impossible to
address for businesses scholar has taken assistance of qualitative research type. Use of theoretical
information has helped scholar in answering research questions easily. This has helped in
understanding topic easily and finding out the why cybersecurity challenges are impossible to
address by organizations. Another reason of selecting qualitative research is that it is suitable in
the investigation where small size is small. Because outcome or results are not quantifiable. By
using this method scholar has become able to describe things and analyses data in significant
manner (Smith and et.al., 2017).
Secondary data
Secondary data are such information which are already gathered by any other person and
researcher use these information to develop understanding about subject matter. This is the work
of other authors which are being used in current studies. By referring these data scholars try to
answer research questions of current investigations (Meredith and et.al., 2018). One of the major
benefit of using secondary information is that it is economically beneficial and also saves time of
scholar. But researcher fails to involve current information. Books journals, government sites.
Articles are example of secondary data collection sources. Researcher cannot conduct new
survey as individual has to use already available information which sometimes restrict the
finding. But use of secondary source help in knowing about topic in broader aspects. In the
current research on data digitalization made cybersecurity challenges impossible to address for
businesses investigator has taken assistance of books, journals and government sites. All these
sources have supported in developing understanding about cybersecurity issues and why
business fail to address this problem effectively. Use of such tools have supported scholar in
answering research questions and drawing valid conclusion (Quinlan and et.al., 2019).
Primary data- The data in the report will be collected by the help of primary data. Data
collection can be defining as the procedure which can be used for assembling and measuring
information that can help the people in answering proper question and evaluating the outcomes.
Primary data can be collected from the people directly. It is the raw data which can be collected
by the user. The various type of method which can be used in collecting primary data is
that results can be interpreted in effective manner. Furthermore, it is conclusive in nature (Antwi
and Hamza, 2015).
In the current research on data digitalization made cybersecurity challenges impossible to
address for businesses scholar has taken assistance of qualitative research type. Use of theoretical
information has helped scholar in answering research questions easily. This has helped in
understanding topic easily and finding out the why cybersecurity challenges are impossible to
address by organizations. Another reason of selecting qualitative research is that it is suitable in
the investigation where small size is small. Because outcome or results are not quantifiable. By
using this method scholar has become able to describe things and analyses data in significant
manner (Smith and et.al., 2017).
Secondary data
Secondary data are such information which are already gathered by any other person and
researcher use these information to develop understanding about subject matter. This is the work
of other authors which are being used in current studies. By referring these data scholars try to
answer research questions of current investigations (Meredith and et.al., 2018). One of the major
benefit of using secondary information is that it is economically beneficial and also saves time of
scholar. But researcher fails to involve current information. Books journals, government sites.
Articles are example of secondary data collection sources. Researcher cannot conduct new
survey as individual has to use already available information which sometimes restrict the
finding. But use of secondary source help in knowing about topic in broader aspects. In the
current research on data digitalization made cybersecurity challenges impossible to address for
businesses investigator has taken assistance of books, journals and government sites. All these
sources have supported in developing understanding about cybersecurity issues and why
business fail to address this problem effectively. Use of such tools have supported scholar in
answering research questions and drawing valid conclusion (Quinlan and et.al., 2019).
Primary data- The data in the report will be collected by the help of primary data. Data
collection can be defining as the procedure which can be used for assembling and measuring
information that can help the people in answering proper question and evaluating the outcomes.
Primary data can be collected from the people directly. It is the raw data which can be collected
by the user. The various type of method which can be used in collecting primary data is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

observation, survey, experimentation and observation is called primary data. Questionnaire can
also be used as the method of collecting primary data (Smith and et.al., 2017).
There are various type of primary sources which includes observation method. This
method can be used for collecting data related to behavioural sciences. In this method researcher
can make or take help from scientific tools for collecting information where it provides
formulated researcher. Advantages of observation data collection method include direct access to
research phenomena, high levels of flexibility in terms of application and generating a permanent
record of phenomena to be referred to later. Data can also be collected by the help of interview
method. The interview can take place on telephone and also researchers can do interview by face
to face communication method (Meredith and et.al., 2018). Questionnaire method is also one
way of collecting data which is raw. In this questionnaire can be send to the respondent on mail
and they can reply back to those mail sent. Respondent are expected to understand the
questionnaire properly and then answer it. Number of questions which the respondent needs to
answer is also given in the questionnaire. There is also another method of data collection which
is schedule method. This method is similar to the questionnaire method of data collection. This
type of method can be used when the researcher is doing extensive enquiry. Therefore this
method is really expensive. Other type of data collection method is known as secondary data
collection method. It means the data is collected with the help of books, journals, magazines, etc.
In order to make the research successful, the method which is used for the report is
primary sources that is questionnaire. It is a primary source or method of collection. The main
reason to use this method of data collection is to gather, factual and reliable information. This
method can be used by researcher to gain accurate and authentic information.
Sample size- Sample size can be defining as the way of selecting the number of respondents or
participants which needs to be included in a statistical sample. The number of replicates which
can be taken in the report is 10 (McConville, 2017).
Sampling approach- There are two types of approaches which is included in sampling. The one
is probability method and other is non probability method. Probability method can be used for
choosing any member which is random from the population by making up the few selection
criteria. Non probability sampling approach can be comparatively done by researcher on lower
cost.
also be used as the method of collecting primary data (Smith and et.al., 2017).
There are various type of primary sources which includes observation method. This
method can be used for collecting data related to behavioural sciences. In this method researcher
can make or take help from scientific tools for collecting information where it provides
formulated researcher. Advantages of observation data collection method include direct access to
research phenomena, high levels of flexibility in terms of application and generating a permanent
record of phenomena to be referred to later. Data can also be collected by the help of interview
method. The interview can take place on telephone and also researchers can do interview by face
to face communication method (Meredith and et.al., 2018). Questionnaire method is also one
way of collecting data which is raw. In this questionnaire can be send to the respondent on mail
and they can reply back to those mail sent. Respondent are expected to understand the
questionnaire properly and then answer it. Number of questions which the respondent needs to
answer is also given in the questionnaire. There is also another method of data collection which
is schedule method. This method is similar to the questionnaire method of data collection. This
type of method can be used when the researcher is doing extensive enquiry. Therefore this
method is really expensive. Other type of data collection method is known as secondary data
collection method. It means the data is collected with the help of books, journals, magazines, etc.
In order to make the research successful, the method which is used for the report is
primary sources that is questionnaire. It is a primary source or method of collection. The main
reason to use this method of data collection is to gather, factual and reliable information. This
method can be used by researcher to gain accurate and authentic information.
Sample size- Sample size can be defining as the way of selecting the number of respondents or
participants which needs to be included in a statistical sample. The number of replicates which
can be taken in the report is 10 (McConville, 2017).
Sampling approach- There are two types of approaches which is included in sampling. The one
is probability method and other is non probability method. Probability method can be used for
choosing any member which is random from the population by making up the few selection
criteria. Non probability sampling approach can be comparatively done by researcher on lower
cost.

In this report researcher is making use of simple random sampling method that can help
them to conduct research. Use of random sampling is appropriate technique as scholar become
able to minimise biasness in answers which will help in getting most reliable answers. It is
simple and time saving technique which give most desirable results to scholar. This type of
method is a part of probability sampling method. It can be considered as one of the best and
adequate sampling method. This method can help researcher in saving their time and is a cost
efficient method (McConville, 2017). In this report, random sampling technique is being selected
so that there has been equal chance of selection. It is a very fair method of selection. It provides
equal chance to every respondent. This type of method can be used easily as this requires less
knowledge. It is also one of the easiest and simplest form of data collection. This method of
sampling is also most relevant and fair one.
Questionnaire design factors :
In context of present investigation on topic challenges in cyber security for business,
questionnaire technique has been utilised by researcher for collecting the facts related to
subject. Both open and close ended questionnaire has been included in questionnaire form.
Such technique has been applied by researcher in order to gather detail information about
the topic. In addition to this, other reason for including the open ended questions is to
provide participants flexibility in expanding their response. Close ended questions has been
included as investigator perceives that it the technique which will assist them in getting the
relevant answers of the question Both aims and objectives of investigation has been
considered by researcher while designing the questions for collecting the information about
the topic (McConville, 2017)..
Data collection methods : data collection is considered to be as one of the crucial activity in
investigation. Without the information the investigation process can not be proceed further. It is
very much crucial for researcher to develop understanding that the reliability as well as validity
of the research findings is completely based in the techniques which has been applied for
collecting the data about the subject. The data related to the subject can be accumulated mainly
from two sources these are primary and secondary. In relation to the investigation on topic
identification of the challenges in cyber security for business, investigator has gathered facts
about the issue from both both primary as well as secondary sources The researcher has used
both primary as well as secondary sources in order to gather huge amount of information about
them to conduct research. Use of random sampling is appropriate technique as scholar become
able to minimise biasness in answers which will help in getting most reliable answers. It is
simple and time saving technique which give most desirable results to scholar. This type of
method is a part of probability sampling method. It can be considered as one of the best and
adequate sampling method. This method can help researcher in saving their time and is a cost
efficient method (McConville, 2017). In this report, random sampling technique is being selected
so that there has been equal chance of selection. It is a very fair method of selection. It provides
equal chance to every respondent. This type of method can be used easily as this requires less
knowledge. It is also one of the easiest and simplest form of data collection. This method of
sampling is also most relevant and fair one.
Questionnaire design factors :
In context of present investigation on topic challenges in cyber security for business,
questionnaire technique has been utilised by researcher for collecting the facts related to
subject. Both open and close ended questionnaire has been included in questionnaire form.
Such technique has been applied by researcher in order to gather detail information about
the topic. In addition to this, other reason for including the open ended questions is to
provide participants flexibility in expanding their response. Close ended questions has been
included as investigator perceives that it the technique which will assist them in getting the
relevant answers of the question Both aims and objectives of investigation has been
considered by researcher while designing the questions for collecting the information about
the topic (McConville, 2017)..
Data collection methods : data collection is considered to be as one of the crucial activity in
investigation. Without the information the investigation process can not be proceed further. It is
very much crucial for researcher to develop understanding that the reliability as well as validity
of the research findings is completely based in the techniques which has been applied for
collecting the data about the subject. The data related to the subject can be accumulated mainly
from two sources these are primary and secondary. In relation to the investigation on topic
identification of the challenges in cyber security for business, investigator has gathered facts
about the issue from both both primary as well as secondary sources The researcher has used
both primary as well as secondary sources in order to gather huge amount of information about
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

the subject . The primary data has been collected using the questionnaire technique. Rationale
for selecting the questionnaire technique is that it is less cost and time consuming method of data
collection . In addition to by by applying the questionnaire technique, the participants can be
provided with an ease in answering the questions. Questionnaire form has been circulated to
participants through E-mail. The secondary data has been gathered using books, journals,
magazines, online articles etc (Quinlan and et.al., 2019).
Data analysis and interpretation : Data analysis can be referred to as refinement of
information. The refining of data is very much crucial in order to extract meaningful
information. It is the through analysing the data researcher has been able to reach the
conclusion. Selection of the technique for analysing the information is completed based on the
type of investigation being performed. The data analysis procedure which assist investigator in
making suitable decisions. In relation to the quantitative research, statistical or mathematical
techniques can be applied for analysis the data. Annova or chi square test can be applied for
testing the outcomes. But as present study is qualitative in nature, therefore, investigator has
utilised the qualitative analysis technique for analysing the facts about the topic. In addition to
this, the thematic analysis is the technique which has been applied by researcher in present study
for interpreting the facts about the challenges in cyber security for business. The different themes
are designed by investigator on the basis of the response provided by the participants. Thematic
analysis technique has been applied by researcher because it is the technique which provides
them in analysing the pattern of responses provided by respondent and helps them in reaching to
conclusion. In addition to this, tables and chart has been design in order to present the findings
in an appropriate manner. The other reason for preparing the theme is that it helps researcher in
making the research report presentable as well as understandable by user (Flick, 2018.)..
Summary of the key findings
From the above, it has been summarized that Internet is become a basic requirement of
the most people for their professional purpose. But it is realized that the digitalization also
become a serious security risk because now the information is converted to the digital format that
increase cybercrime. The research main aim is to determine that most of the business faces threat
related to cybersecurity and as per the view of (Greving, Sassenberg and Fetterman, 2015) the
increase use of smartphone and computer also increase the danger of cybersecurity and that is
why , the offline system is consider the most secure data storage solutions. Offline data storage
for selecting the questionnaire technique is that it is less cost and time consuming method of data
collection . In addition to by by applying the questionnaire technique, the participants can be
provided with an ease in answering the questions. Questionnaire form has been circulated to
participants through E-mail. The secondary data has been gathered using books, journals,
magazines, online articles etc (Quinlan and et.al., 2019).
Data analysis and interpretation : Data analysis can be referred to as refinement of
information. The refining of data is very much crucial in order to extract meaningful
information. It is the through analysing the data researcher has been able to reach the
conclusion. Selection of the technique for analysing the information is completed based on the
type of investigation being performed. The data analysis procedure which assist investigator in
making suitable decisions. In relation to the quantitative research, statistical or mathematical
techniques can be applied for analysis the data. Annova or chi square test can be applied for
testing the outcomes. But as present study is qualitative in nature, therefore, investigator has
utilised the qualitative analysis technique for analysing the facts about the topic. In addition to
this, the thematic analysis is the technique which has been applied by researcher in present study
for interpreting the facts about the challenges in cyber security for business. The different themes
are designed by investigator on the basis of the response provided by the participants. Thematic
analysis technique has been applied by researcher because it is the technique which provides
them in analysing the pattern of responses provided by respondent and helps them in reaching to
conclusion. In addition to this, tables and chart has been design in order to present the findings
in an appropriate manner. The other reason for preparing the theme is that it helps researcher in
making the research report presentable as well as understandable by user (Flick, 2018.)..
Summary of the key findings
From the above, it has been summarized that Internet is become a basic requirement of
the most people for their professional purpose. But it is realized that the digitalization also
become a serious security risk because now the information is converted to the digital format that
increase cybercrime. The research main aim is to determine that most of the business faces threat
related to cybersecurity and as per the view of (Greving, Sassenberg and Fetterman, 2015) the
increase use of smartphone and computer also increase the danger of cybersecurity and that is
why , the offline system is consider the most secure data storage solutions. Offline data storage
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

means that only use single copy of data but in that case when it is attacked by virus then the
entire data is lost which is a biggest concern. Thus researcher also find out that using internet and
electronic device are beneficial for storing business purpose data.
But on the other side, the Internet of things is one of the most common threat related to
cybersecurity and it is so because more than 90% of the people and the professionals are
completely depend upon the internet and many businessman are also secured their company's
data in laptop. But actually it is not safe because once it is controlled by the hackers then all the
information are shared with them. Further, from the researcher it is also found that most of the
people are totally depend on the cloud storage in order to back up their information in their own
devices, but some of them consider it as a threat because data may be used by other (Lin and
et.al., 2018). Thus, it is summarize that cloud storage also consider a threat fro the people
because when an individual install any application which contain any sensitive data then it may
be accessed by the server online which may be further blocked and accessed by a government.
That is why, it is consider a threat.
In addition to this, from the literature section it is found that in market there are many
books which shows how the software application codes are altered by removing the licence
restriction and in that time, the spyware codes are also added that can easily access information
easily. That is why, it is necessary to understood the protective measure in order to protect the
data as well as information from getting misused or exposed.
CONCLUSION
From the above, it has been concluded that cybersecurity become a major concern for
most of the people and people also faces threat related to continuous use of Internet for securing
the data. As it is cleared that researcher uses secondary data collection methods such as books
and articles, Journals which shows Internet provide a wide range of information but users has to
determine the effective way in which they may be exposed to the threat. Moreover, it is also
concluded that in order to make the research more effective and find out the answer related to
question, researcher uses simple random sampling method in which 25 managers of IT industry
are chosen so that they get their review related to the topic.
Additionally, it has been concluded that as there is increase number of internet users and
as a result it directly promote the cybersecurity threats as well. That is why, in order to overcome
entire data is lost which is a biggest concern. Thus researcher also find out that using internet and
electronic device are beneficial for storing business purpose data.
But on the other side, the Internet of things is one of the most common threat related to
cybersecurity and it is so because more than 90% of the people and the professionals are
completely depend upon the internet and many businessman are also secured their company's
data in laptop. But actually it is not safe because once it is controlled by the hackers then all the
information are shared with them. Further, from the researcher it is also found that most of the
people are totally depend on the cloud storage in order to back up their information in their own
devices, but some of them consider it as a threat because data may be used by other (Lin and
et.al., 2018). Thus, it is summarize that cloud storage also consider a threat fro the people
because when an individual install any application which contain any sensitive data then it may
be accessed by the server online which may be further blocked and accessed by a government.
That is why, it is consider a threat.
In addition to this, from the literature section it is found that in market there are many
books which shows how the software application codes are altered by removing the licence
restriction and in that time, the spyware codes are also added that can easily access information
easily. That is why, it is necessary to understood the protective measure in order to protect the
data as well as information from getting misused or exposed.
CONCLUSION
From the above, it has been concluded that cybersecurity become a major concern for
most of the people and people also faces threat related to continuous use of Internet for securing
the data. As it is cleared that researcher uses secondary data collection methods such as books
and articles, Journals which shows Internet provide a wide range of information but users has to
determine the effective way in which they may be exposed to the threat. Moreover, it is also
concluded that in order to make the research more effective and find out the answer related to
question, researcher uses simple random sampling method in which 25 managers of IT industry
are chosen so that they get their review related to the topic.
Additionally, it has been concluded that as there is increase number of internet users and
as a result it directly promote the cybersecurity threats as well. That is why, in order to overcome

such problem, it is quite necessary to provide knowledge related to cybersecurity to all the
individuals that helps them to overcome such problem and determine the way how to use the
things by reducing the threats of Internet.
individuals that helps them to overcome such problem and determine the way how to use the
things by reducing the threats of Internet.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

REFERENCES
Books and Journals
Antwi, S. K. and Hamza, K., 2015. Qualitative and quantitative research paradigms in business
research: A philosophical reflection. European Journal of Business and
Management. 7(3). pp.217-225.
Barquero, B. and Bosch, M., 2015. Didactic engineering as a research methodology: From
fundamental situations to study and research paths. In Task design in mathematics
education (pp. 249-272). Springer, Cham.
Bright, O. J. M. and et.al., 2017. Research Priorities for Studies Linking Intake of Low-Calorie
Sweeteners and Potentially Related Health Outcomes: Research Methodology and Study
Design. Current developments in nutrition. 1(7). p.e000547.
Flick, U., 2018. An introduction to qualitative research. Sage Publications Limited. Researches.
Medical Ethics Journal, 11(42), pp.7-10.
Greving, H., Sassenberg, K. and Fetterman, A., 2015. Counter-regulating on the internet: Threat
elicits preferential processing of positive information. Journal of Experimental Psychology:
Applied.21(3). p.287.
Lin, Z. and et.al., 2018. Pricing Cyber Security Insurance: A Copula Model Using an Objective,
Verifiable, Loss Measure. Verifiable, Loss Measure (July 17, 2018).
McConville, M. ed., 2017. Research methods for law. Edinburgh University Press.
Meredith, S. J. and et.al., 2018. A review of behavioural measures and research methodology in
sport and exercise psychology. International review of sport and exercise
psychology. 11(1). pp.25-46.
Ndlovu-Gatsheni, S., 2017. Decolonising research methodology must include undoing its dirty
history. Journal of Public Administration. 52(Special Issue 1). pp.186-188.
Quinlan, C. and et.al., 2019. Business research methods. South Western Cengage.
Sessler, D. I. and Imrey, P. B., 2015. Clinical research methodology 1: study designs and
methodologic sources of error. Anesthesia & Analgesia. 121(4). pp.1034-1042.
Smith, J. A. and et.al., 2017. Proposing an Initiative Research Methodology for LGBTQ+ Youth:
Photo-Elicitation and Thematic Analysis. Journal of LGBT Issues in Counseling. 11(4).
pp.271-284.
Books and Journals
Antwi, S. K. and Hamza, K., 2015. Qualitative and quantitative research paradigms in business
research: A philosophical reflection. European Journal of Business and
Management. 7(3). pp.217-225.
Barquero, B. and Bosch, M., 2015. Didactic engineering as a research methodology: From
fundamental situations to study and research paths. In Task design in mathematics
education (pp. 249-272). Springer, Cham.
Bright, O. J. M. and et.al., 2017. Research Priorities for Studies Linking Intake of Low-Calorie
Sweeteners and Potentially Related Health Outcomes: Research Methodology and Study
Design. Current developments in nutrition. 1(7). p.e000547.
Flick, U., 2018. An introduction to qualitative research. Sage Publications Limited. Researches.
Medical Ethics Journal, 11(42), pp.7-10.
Greving, H., Sassenberg, K. and Fetterman, A., 2015. Counter-regulating on the internet: Threat
elicits preferential processing of positive information. Journal of Experimental Psychology:
Applied.21(3). p.287.
Lin, Z. and et.al., 2018. Pricing Cyber Security Insurance: A Copula Model Using an Objective,
Verifiable, Loss Measure. Verifiable, Loss Measure (July 17, 2018).
McConville, M. ed., 2017. Research methods for law. Edinburgh University Press.
Meredith, S. J. and et.al., 2018. A review of behavioural measures and research methodology in
sport and exercise psychology. International review of sport and exercise
psychology. 11(1). pp.25-46.
Ndlovu-Gatsheni, S., 2017. Decolonising research methodology must include undoing its dirty
history. Journal of Public Administration. 52(Special Issue 1). pp.186-188.
Quinlan, C. and et.al., 2019. Business research methods. South Western Cengage.
Sessler, D. I. and Imrey, P. B., 2015. Clinical research methodology 1: study designs and
methodologic sources of error. Anesthesia & Analgesia. 121(4). pp.1034-1042.
Smith, J. A. and et.al., 2017. Proposing an Initiative Research Methodology for LGBTQ+ Youth:
Photo-Elicitation and Thematic Analysis. Journal of LGBT Issues in Counseling. 11(4).
pp.271-284.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

APPENDIX
Example of some research questions which has been included in the questionnaire form are :
1. What are the types of cyber security threats ?
1. What are the challenges faced by your company in relation to cyber security ?
2. What are the business risk associated with cyber security ?
3. What is the technique that can be adopted by organisation in order to avoid such type of
business risk related to cyber security ?
4. Is your organisation is taking efforts for dealing with such type of cyber security
threats ?
5. Does your organisation has implement policies for preventing cyber crime at workplace ?
6. Upto what extend you are agree with the statement that company have to face huge
financial losses due to cyber crime due by its employees ?
7. Does cyber security has great significance in business?
8. What are the emerging trends related to cybersecurity ?
9. what are the main areas of risk for your organization ?
Infrastructure
Application
Other
1
Example of some research questions which has been included in the questionnaire form are :
1. What are the types of cyber security threats ?
1. What are the challenges faced by your company in relation to cyber security ?
2. What are the business risk associated with cyber security ?
3. What is the technique that can be adopted by organisation in order to avoid such type of
business risk related to cyber security ?
4. Is your organisation is taking efforts for dealing with such type of cyber security
threats ?
5. Does your organisation has implement policies for preventing cyber crime at workplace ?
6. Upto what extend you are agree with the statement that company have to face huge
financial losses due to cyber crime due by its employees ?
7. Does cyber security has great significance in business?
8. What are the emerging trends related to cybersecurity ?
9. what are the main areas of risk for your organization ?
Infrastructure
Application
Other
1
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





