Business Research: Reflective Report on Cyber Security Challenges

Verified

Added on  2020/03/15

|6
|1749
|101
Report
AI Summary
This reflective report analyzes the challenges of cyber security in businesses, based on a research study. The report identifies research aims, objectives, and justifications, focusing on cyber security challenges for Australian businesses. It defines cyber security and its importance, covering risks like cyber thefts, malware, and cyber espionage. The report explores various risks such as insecure passwords, computer sabotage, clickjacking, tampering, and insider threats. It also covers research questions, hypotheses, and methodologies, including qualitative research, research method validity, sampling methods (probability and non-probability), and data collection methods (primary and secondary). The report also discusses research limitations and the importance of a research plan, including the use of Gantt charts for time management. References are provided at the end of the report.
Document Page
Running Head: BUSINESS RESEARCH
Business Research
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
BUSINESS RESEARCH
Reflective Report
I increased my knowledge regarding challenges of cyber security in businesses from this
research study. I learned about the research aims and objective of that will be effective to
accomplish the research in an effective way. I analyzed that the primary aim of this research
is to identify and evaluate certain cyber security challenges for businesses in Australia.
Furthermore, I gained my knowledge towards the research justification that will be
supportive to identify the rationality of research in an effective manner (Flick, 2015).
It will support to identify the motivation of this research systematically. Cyber security is a
technical procedure and implementations which is designed to secure personal computers
together with their components from damages. In addition, I also learned that it is
accountable to protect the software of computers, computer network, hardware devises,
computer data, and programmes from the unauthorized workers from being damaged. I also
gained my understanding about the significance of project in long-run. At the same time, I
created conceptual understanding towards the research issues in an appropriate manner. There
are different types of cyber security risk such as Cyber Thefts, Malware and Vectors Risks,
and Cyber Espionage (Gunes, eta l., 2014).
In addition to this, I also gained my understanding about some additional risk such as
insecure passwords, computer sabotage, clickjacking, tampering, and insider threats. In
addition to this, I deeply enhanced my knowledge towards the Cyber thefts that would be a
primary issue for an organization. Cyber thefts turn around the stealing of company data,
especially financial data. A large number of organizations were faced such kinds of issues
that declined the financial performance (Katal, et al., 2013).
Along with this, I also gained my knowledge about Cyber Espionage that is another kind of
cyber security risk that will also be a negative impact on the performance of an organization.
The Cyber Espionage is related to application of computers and internet to address the
Document Page
3
BUSINESS RESEARCH
confidential data of company by unauthorized people that will create a complexity in a
corporate. In addition, it can be said that the cyber espionage is presently being executed by a
large number of unauthorized workers to obtain unauthorized data which will be used to
blackmail to the company (Mackey, et al., 2015).
Along with this, I also learned that the Cyber criminals improve their techniques by internet
and computer attack with some additional devices named malware. In addition, I increased
my knowledge about the malware technique that enabled the people to address unauthorized
information on computers and internet. It is classified into certain parts such as worms,
ransomware, Trojans, spyware, and viruses. At the same time, it can be said that such kinds
of information can be effective to improve my professional life in long-term. It will be also
beneficial to successfully deal with such kind of issues in long-term in a systematic way.
From this research, I learned about research question and hypothesis that will be necessary
for identifying the research issue (Sadeghi, et al., 2015).
At the same time, I understood about two kinds’ of research questions named primary and
secondary questions. The primary questions are based on statistical data while the secondary
questions are based on theoretical data. Along with this, both primary and secondary data
collection methods plays an imperative role in the research due to collecting the data in a
specified time. In addition to this, I also learned about the research methodology that will be
significant to identify the tools and techniques to accomplish the research task in an
appropriate manner. From the research methodology, I gained my knowledge towards four
kinds of factors such as qualitative research method, research method validity, sampling
method, and data collection method (Scully, 2014).
I understood that the qualitative research method is used to collect the data from the survey,
observation, and interview method. At the same time, it can be said that the qualitative
research method can be significant to obtain the reliable result in an appropriate manner.
Document Page
4
BUSINESS RESEARCH
Along with this, I also learned that the qualitative research can gain the understanding about
the research dilemma. I increased my knowledge towards the research method validity that
can be effective to measure accuracy of this research. It would be significant to improve my
professional as well as personal life (Silverman, 2016).
In addition to this, I also learned about sampling method that will be effective to improve my
research skills in an appropriate manner. There are two kinds of sampling methods such as
probability sampling and non-probability sampling method. Additionally, both sampling
methods were significant in the research. The non-probability sampling method selects
participant on the basis of certain factors such as age, gender, education, experience, and
skill. It can create partiality in the research during the selection of respondents to accomplish
the task of research in an appropriate manner. In this research, probability sampling method is
useful because the research is subjective in nature while the non-probability sampling method
is used in case the research dilemma is objective in nature. The probability sampling method
is useful because it mitigates the biases from the research in a systematic way. The
probability sampling method offers an equal chance to participants for reacting on the survey
through a questionnaire (Taylor, et al., 2015).
It includes random sampling method to select the respondents in an appropriate manner.
Moreover, I increased my knowledge towards the probability sampling method in depth that
was effective to boost my research skills and developed that capability to select the
participants to collect the information about a research problem. Along with this, I also
improved my knowledge regarding data collection methods such as primary data collection
method and secondary data collection method. The primary data collection method is
important to obtain fresh or new data systematically. There are different sources that can be
used to collect the primary data like observation, survey, and questionnaire (Tonge, et al.,
2013). At the same time, I also created my knowledge towards the secondary data collection
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
BUSINESS RESEARCH
methods like company websites, academic journals, textbook, online and offline sources, and
magazine. Moreover, the secondary data collection method is fully relied on the primary data.
The understanding about the data collection method can be helpful for increased the
additional research skills and groom my personality because of enhancement of the
knowledge in a systematic manner (Yan, et al., 2013).
I also gained my awareness about the research limitation that will be appropriate to perform
the research in an appropriate manner in long-run. Along with this, I learned that there are
some significant factors that are considered in the research limitation such as lack of funds,
respondents are failed to react on the questionnaire, participants are not capable to provide an
accurate response and an unspecified time (Taylor, et al., 2015).
In addition to this, I also created my understanding about the research plan along with
importance of the research plan. Additionally, it can be said that Gantt chart is also effective
to estimate the time for completion of the research. I gained depth knowledge regarding Gantt
chart that will support to improve my time management skills in an appropriate manner. The
time management can be significant to accomplish the task in less time and cost (Tonge, et
al., 2013).
Document Page
6
BUSINESS RESEARCH
References
Flick, U. (2015) Introducing research methodology: A beginner's guide to doing a research
project, USA: Sage.
Gunes, V., Peter, S., Givargis, T., and Vahid, F. (2014) ‘A survey of concepts, applications,
and challenges in cyber-physical systems. TIIS, 8(12), pp. 4242-4268.
Katal, A., Wazid, M., and Goudar, R. H. (2013) ‘Big data: issues, challenges, tools and good
practices’, In Contemporary Computing (IC3), 2013 Sixth International Conference on (pp.
404-409). IEEE.
Mackey, A., and Gass, S. M. (2015) Second language research: Methodology and design,
UK: Routledge.
Sadeghi, A. R., Wachsmann, C., and Waidner, M. (2015) ‘Security and privacy challenges in
the industrial internet of things’, In Design Automation Conference (DAC), 2015 52nd
ACM/EDAC/IEEE (pp. 1-6). IEEE.
Scully, T. (2014) ‘The cyber security threat stops in the boardroom’, Journal of business
continuity and emergency planning, 7(2), pp. 138-148.
Silverman, D. (Ed.). (2016). Qualitative research, USA: Sage.
Taylor, S. J., Bogdan, R., and DeVault, M. (2015) Introduction to qualitative research
methods: A guidebook and resource, USA: John Wiley and Sons.
Tonge, A. M., Kasture, S. S., and Chaudhari, S. R. (2013) ‘Cyber security: challenges for
society-literature revie’, IOSR Journal of Computer Engineering, 2(12), pp. 67-75.
Yan, Y., Qian, Y., Sharif, H., and Tipper, D. (2013) ‘A survey on smart grid communication
infrastructures: Motivations, requirements and challenges, IEEE communications surveys and
tutorials, 15(1), pp. 5-20.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]