A Comprehensive Research Report on Business Cybersecurity Challenges
VerifiedAdded on 2021/05/31
|19
|3444
|267
Report
AI Summary
This business research report investigates the multifaceted challenges of cybersecurity faced by organizations. The report begins with an introduction that highlights the increasing reliance on the internet for various business operations and the associated cyber security risks. It defines the project's objectives, which include analyzing the concept of cybersecurity and its challenges, and outlines the project's scope. A comprehensive literature review synthesizes existing research on cybersecurity threats, social media's role, mobile banking vulnerabilities, and various cyber issues such as DDoS attacks, malware, and hacktivism. The report also presents the research questions and hypotheses, detailing the impact of cybersecurity on organizational performance. The methodology section explains the qualitative and quantitative research methods, inductive and deductive approaches, data collection strategies using primary and secondary sources, and sampling techniques. It describes the research strategy, target market, and ethical considerations, including addressing plagiarism and copyright issues. The report concludes by acknowledging research limitations, such as time and financial constraints. Overall, the report offers a detailed analysis of cybersecurity challenges, research methods, and potential solutions for businesses.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running Head: Business research 1
Business research
Business research
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Business research 2
Contents
Introduction......................................................................................................................................3
Project objective..............................................................................................................................4
Project scope....................................................................................................................................5
Literature review..............................................................................................................................6
Research questions...........................................................................................................................8
Research designs and methodology.................................................................................................9
Research limitations.......................................................................................................................10
Time schedule................................................................................................................................11
Gantt chart.....................................................................................................................................12
Conclusion.....................................................................................................................................13
Reference list.................................................................................................................................14
Contents
Introduction......................................................................................................................................3
Project objective..............................................................................................................................4
Project scope....................................................................................................................................5
Literature review..............................................................................................................................6
Research questions...........................................................................................................................8
Research designs and methodology.................................................................................................9
Research limitations.......................................................................................................................10
Time schedule................................................................................................................................11
Gantt chart.....................................................................................................................................12
Conclusion.....................................................................................................................................13
Reference list.................................................................................................................................14

Business research 3
Introduction
The use of internet has been increasing day by day as number of people are reliant over the
internet to complete their number of tasks regarding to the entertainment, finance and shopping.
Many people get support from the application of social media as it facilitates to share the
information with family and friends. The services of internet are used by the private sector public
and individuals that protect them from the cyber security risk. The research paper will elaborate a
number of factors regarding the challenges of cybersecurity faced by business. Along with that
the recommendations will be made regarding overcoming the cyber security challenges. The
project objective and the project scope of the research program will define the main aim of the
report. Research methodology is the important section of the paper that will tell about the sources
from which the information is gathered for the selected topic.
Introduction
The use of internet has been increasing day by day as number of people are reliant over the
internet to complete their number of tasks regarding to the entertainment, finance and shopping.
Many people get support from the application of social media as it facilitates to share the
information with family and friends. The services of internet are used by the private sector public
and individuals that protect them from the cyber security risk. The research paper will elaborate a
number of factors regarding the challenges of cybersecurity faced by business. Along with that
the recommendations will be made regarding overcoming the cyber security challenges. The
project objective and the project scope of the research program will define the main aim of the
report. Research methodology is the important section of the paper that will tell about the sources
from which the information is gathered for the selected topic.

Business research 4
Project objective
The objective of this research program is to analyse the meaning and the concept of cyber
security. Along with that the research will analyze the challenges of cybersecurity faced by the
organization. The cyber security challneges should be mitigated in an effecient manner that is
whythe recommednations will be made to define the solution of challenges of cyber security.
Project objective
The objective of this research program is to analyse the meaning and the concept of cyber
security. Along with that the research will analyze the challenges of cybersecurity faced by the
organization. The cyber security challneges should be mitigated in an effecient manner that is
whythe recommednations will be made to define the solution of challenges of cyber security.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Business research 5
Project scope
The project scope of the research is wide as it covers the huge range of cyber security challenges
on the performance of organization. (Campos, Sharma, Jantunen, Baglee, and Fumagalli, 2016).
This research will support readers to get better understanding about the concept of the research
which can be used by them to create further research.
Project scope
The project scope of the research is wide as it covers the huge range of cyber security challenges
on the performance of organization. (Campos, Sharma, Jantunen, Baglee, and Fumagalli, 2016).
This research will support readers to get better understanding about the concept of the research
which can be used by them to create further research.

Business research 6
Literature review
According to Joglekar and Pise, (2016), people use a number of online methods to create a
connection with families and friends because it provides several business opportunities to the
small organization for enlarging their business. The confidential or personal information is being
shared by both individual and company that make higher possibilities of cyber security threat.
He, et. al., (2016), argued that hackers use a legal system to hack the personal information of the
individual to get the unfair benefits. It would decline the financial performance of the
organization it has been found from the previous research that there are more than 2.9 who used
the social media platform for sharing the information. Along with that, many organizations use
the social media sites to conduct the business activities such as market research, data collection,
advertising and feedback. According to Gomes, Iivari, Ahokangas, Isotalo, and Niemelä, (2017),
the popularity of the social sites can be able to create a higher chance of cyber security risk.
There are a number of organizations such as Old Spice Starbucks and Oreo that make their
unique image in the Marketplace by using the social media sites. Along with that there is
example of some organizations such as PlayStation, HBO and Google that suffered from the
cyber crimes that caused in the loss of valued information.
As perFutter, (2016), Mobile banking services has been implemented by various banks to attract
its number of customers towards the services. The latest technology in the banking industry in
which effective application such as pay-pal and mobile wallet are implied by the organisation to
transfer the money from one place to another. It enables organisation to transfer their money and
being the cause of potential cyber threats. In oppose to this, Kaplan et al. (2015), that in recent
scenario, it has been found that number of banks are failed to secure confidential data of
consumers which increase the chance of data leakage. There are number of cyber issues are faced
Literature review
According to Joglekar and Pise, (2016), people use a number of online methods to create a
connection with families and friends because it provides several business opportunities to the
small organization for enlarging their business. The confidential or personal information is being
shared by both individual and company that make higher possibilities of cyber security threat.
He, et. al., (2016), argued that hackers use a legal system to hack the personal information of the
individual to get the unfair benefits. It would decline the financial performance of the
organization it has been found from the previous research that there are more than 2.9 who used
the social media platform for sharing the information. Along with that, many organizations use
the social media sites to conduct the business activities such as market research, data collection,
advertising and feedback. According to Gomes, Iivari, Ahokangas, Isotalo, and Niemelä, (2017),
the popularity of the social sites can be able to create a higher chance of cyber security risk.
There are a number of organizations such as Old Spice Starbucks and Oreo that make their
unique image in the Marketplace by using the social media sites. Along with that there is
example of some organizations such as PlayStation, HBO and Google that suffered from the
cyber crimes that caused in the loss of valued information.
As perFutter, (2016), Mobile banking services has been implemented by various banks to attract
its number of customers towards the services. The latest technology in the banking industry in
which effective application such as pay-pal and mobile wallet are implied by the organisation to
transfer the money from one place to another. It enables organisation to transfer their money and
being the cause of potential cyber threats. In oppose to this, Kaplan et al. (2015), that in recent
scenario, it has been found that number of banks are failed to secure confidential data of
consumers which increase the chance of data leakage. There are number of cyber issues are faced

Business research 7
by the organization such as IoT, DDoS, Malware, Smartphone Ransomware and Hacktivists
(Shackelford, 2016). The distributed denial of services (DDoS) is attacked on the online users
and impact number of business activities. Along with that internet of things is a technique which
is used by number of people in which the hackers can easily attain the personal information
about an individual (Butcher, 2014). A Smartphone malware technique is another approach
which enables the hackers to use confidential data of individuals. ‘Plankton’ Malware and
‘DroneKungFu’ are malware software by which the hackers collect the datafromSmartphone
users by back door. In the current scenario, many organizations use latest techniques to secure
their confidential data. According to Chou, (2013), Hacktivism is dangerous for the company
because the initially it facilitates hackers to demolish the image of the company in the
marketplace afterward they make monetarily hinder to the organization.
It has been recommended that companies should imply encryption to protect their
confidentialdata from the cybercrime (Frank, et. al., 2013). Alomg with that the company should
focus on security camera, biometric locks, and other security technique in the computer so that
the data can be protected in efficient manner. The company should invest in cyber security
techniques as it enables to protect the data in an efficient manner. Berman, Kesterson-Townes,
Marshall, and Srivathsa, (2012), depicted that companies should use security software, firewalls
and antivirus as it would be helpful to decline the potential threat of cyber security. Along with
that the different sort of passwords including symbol is used by organizations to secure the
private or confidential information of person as well as companies. It has been found that the
companies using easy password at the time of dealing with financial transactions (Dinh, Lee,
Niyato and Wang, 2013). Especially when they use banking services and products, it is required
for them to use strong passwords. The noteworthy organizational culture should be made by the
by the organization such as IoT, DDoS, Malware, Smartphone Ransomware and Hacktivists
(Shackelford, 2016). The distributed denial of services (DDoS) is attacked on the online users
and impact number of business activities. Along with that internet of things is a technique which
is used by number of people in which the hackers can easily attain the personal information
about an individual (Butcher, 2014). A Smartphone malware technique is another approach
which enables the hackers to use confidential data of individuals. ‘Plankton’ Malware and
‘DroneKungFu’ are malware software by which the hackers collect the datafromSmartphone
users by back door. In the current scenario, many organizations use latest techniques to secure
their confidential data. According to Chou, (2013), Hacktivism is dangerous for the company
because the initially it facilitates hackers to demolish the image of the company in the
marketplace afterward they make monetarily hinder to the organization.
It has been recommended that companies should imply encryption to protect their
confidentialdata from the cybercrime (Frank, et. al., 2013). Alomg with that the company should
focus on security camera, biometric locks, and other security technique in the computer so that
the data can be protected in efficient manner. The company should invest in cyber security
techniques as it enables to protect the data in an efficient manner. Berman, Kesterson-Townes,
Marshall, and Srivathsa, (2012), depicted that companies should use security software, firewalls
and antivirus as it would be helpful to decline the potential threat of cyber security. Along with
that the different sort of passwords including symbol is used by organizations to secure the
private or confidential information of person as well as companies. It has been found that the
companies using easy password at the time of dealing with financial transactions (Dinh, Lee,
Niyato and Wang, 2013). Especially when they use banking services and products, it is required
for them to use strong passwords. The noteworthy organizational culture should be made by the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Business research 8
organization as it facilitates in providing the security to prevent their sensitive information and
create an effective image in the market among players. Along with that it has been found that the
organization can be provided the guideline to their employee for saving them against the
challenges of cyber security (Dastjerdi, Tabatabaei, and Buyya, 2012). The training and
development program should be conducted by organization in relation to the cyber security
challenges so that the employees of the company can understand the importance of the data and
keep them in save manner (Mylrea, 2017).
Research questions
The research question and hypothesis are defined below in the context of this research paper.
Research questions
What are the challenges of cybersecurity faced by the organization?
How can prevent from cyber security threats by the organiztaions?
Hypothesis
Cyber security impacts the organization performance in a positive manner.
Cyber security impacts the organization performance in a negative manner.
organization as it facilitates in providing the security to prevent their sensitive information and
create an effective image in the market among players. Along with that it has been found that the
organization can be provided the guideline to their employee for saving them against the
challenges of cyber security (Dastjerdi, Tabatabaei, and Buyya, 2012). The training and
development program should be conducted by organization in relation to the cyber security
challenges so that the employees of the company can understand the importance of the data and
keep them in save manner (Mylrea, 2017).
Research questions
The research question and hypothesis are defined below in the context of this research paper.
Research questions
What are the challenges of cybersecurity faced by the organization?
How can prevent from cyber security threats by the organiztaions?
Hypothesis
Cyber security impacts the organization performance in a positive manner.
Cyber security impacts the organization performance in a negative manner.

Business research 9

Business research 10
Research designs and methodology
Research methodology is considered as the vital aspect for the whole research as it tells about the
sources and methods from where information and data regarding the research is collected.
Research method
Qualitative and quantitative method has been selected for the research method in which the
information regarding the topic has been gathered in an efficient manner (Crossman, 2017). The
main focus of the researcher is on qualitative data in which the researcher gets quality in the data
regarding the chosen topic. It can be definite that the qualitative data is a loom which utilized in
congregation the quality data that assists in handling the quality of the research.
Research approaches
Research approach is integral concept of the entire research in order to gather the information
about the research topic. Inductive and deductive are two major research approaches that
facilitates researcher to gather the information. Inductive approach is being taken for this
research as it facilitates to attain subjective knowledge on the issues of the research. The
reliability and validity of the research is enhanced with the help of this research approach. Along
with that the use of deductive approach is suitable for this research because the researcher has
developed the hypothesis to answer the research questions (Vogel, 2016).
Data collection
The major objective of the data collections is to gather the data regarding the topic in an efficient
manner. Cyber security crime is the biggest challenge for many organizations as it has the ability
Research designs and methodology
Research methodology is considered as the vital aspect for the whole research as it tells about the
sources and methods from where information and data regarding the research is collected.
Research method
Qualitative and quantitative method has been selected for the research method in which the
information regarding the topic has been gathered in an efficient manner (Crossman, 2017). The
main focus of the researcher is on qualitative data in which the researcher gets quality in the data
regarding the chosen topic. It can be definite that the qualitative data is a loom which utilized in
congregation the quality data that assists in handling the quality of the research.
Research approaches
Research approach is integral concept of the entire research in order to gather the information
about the research topic. Inductive and deductive are two major research approaches that
facilitates researcher to gather the information. Inductive approach is being taken for this
research as it facilitates to attain subjective knowledge on the issues of the research. The
reliability and validity of the research is enhanced with the help of this research approach. Along
with that the use of deductive approach is suitable for this research because the researcher has
developed the hypothesis to answer the research questions (Vogel, 2016).
Data collection
The major objective of the data collections is to gather the data regarding the topic in an efficient
manner. Cyber security crime is the biggest challenge for many organizations as it has the ability
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Business research 11
to steal the personal information about the company as well as individuals which may pose threat
to the company. Primary and secondary sources are taken to accumulate the data as they
facilitates in collecting information in statistics and informative way (Thomas, 2015). Real and
quick response is come with the help of primary data. To collect the information through primary
data, questionnaire is being made in which 10 questions entails regarding the cyber security
challenges and investments in cyber security. On the other hand, the more reliable information
has been collected with the help of secondary sources (Turkenburg&McAuley, 2013).
Sampling techniques
It is not possible for the researcher to analyse the huge quantity of the data in short span of time
that is why the sampling techniques facilitates them to do the same in shorter period. Random
sampling technique has been chose to analyse the data in a sophisticated manner by which every
sample of the research get chance to select in which the analysis can be done in more efficiency
manner (Yang and Wen, 2017).
Research strategy
The research should be accomplished within time frame to maintain the effectiveness of it for the
readers. The research strategy should be done by researcher to analyse the importance of each
research activity so that it can be done within selected time frame. In the context of research
strategy, researcher has chosen systematic approach which facilitates to implement each activity
of the research in more sequence way. For which, the action plan is made in which each activity
in sequence way with time frame is mentioned which will facilitate researcher to understand the
importance of each activity.
Target market
to steal the personal information about the company as well as individuals which may pose threat
to the company. Primary and secondary sources are taken to accumulate the data as they
facilitates in collecting information in statistics and informative way (Thomas, 2015). Real and
quick response is come with the help of primary data. To collect the information through primary
data, questionnaire is being made in which 10 questions entails regarding the cyber security
challenges and investments in cyber security. On the other hand, the more reliable information
has been collected with the help of secondary sources (Turkenburg&McAuley, 2013).
Sampling techniques
It is not possible for the researcher to analyse the huge quantity of the data in short span of time
that is why the sampling techniques facilitates them to do the same in shorter period. Random
sampling technique has been chose to analyse the data in a sophisticated manner by which every
sample of the research get chance to select in which the analysis can be done in more efficiency
manner (Yang and Wen, 2017).
Research strategy
The research should be accomplished within time frame to maintain the effectiveness of it for the
readers. The research strategy should be done by researcher to analyse the importance of each
research activity so that it can be done within selected time frame. In the context of research
strategy, researcher has chosen systematic approach which facilitates to implement each activity
of the research in more sequence way. For which, the action plan is made in which each activity
in sequence way with time frame is mentioned which will facilitate researcher to understand the
importance of each activity.
Target market

Business research 12
It is necessary for the research program to make the target in an efficient manner so that it could
be cleared that from where information is to be collected. It helps in identification of a number of
sources from where important data in relation to the selected topics have to be collected. The
combination of primary sources and secondary sources has been taken to set the target. In order
to collect the data regarding the primary, the questionnaire has been prepared in which it will be
represented in front of selected employees of the companies that are facing cybersecurity
challenges. It will help to get a quick response from the selected employees regarding the
questions. On the other hand, the collection of secondary sources has been made with the help of
Internet and journal articles and books which are available after 2008.
Ethical consideration
Research should be done in a valid and ethical manner so that the trust of The Reader over the
research can be maintained for a long time. It is the responsibility of the researcher to take care
of all the selected data in an appropriate manner. This behaviour of the researcher is assisted in
carrying out the further research in a sophisticated way. However, that is face to face the issue of
plagiarism and violation of copyright act in order to gather the data regarding the research topic
by using secondary sources. This issue has been resolved by the researcher to put the in-text
citation in each paragraph with authenticating references.
Research limitations
There are number of issues can be faced by researcher while completing the research program
which might impact the research study in an adverse way that can influence the result of the
research. Time is a key limitation for the researcher in which the researcher is not active to
collect the data regarding each activity in more effective manner. It is vital for the research to
It is necessary for the research program to make the target in an efficient manner so that it could
be cleared that from where information is to be collected. It helps in identification of a number of
sources from where important data in relation to the selected topics have to be collected. The
combination of primary sources and secondary sources has been taken to set the target. In order
to collect the data regarding the primary, the questionnaire has been prepared in which it will be
represented in front of selected employees of the companies that are facing cybersecurity
challenges. It will help to get a quick response from the selected employees regarding the
questions. On the other hand, the collection of secondary sources has been made with the help of
Internet and journal articles and books which are available after 2008.
Ethical consideration
Research should be done in a valid and ethical manner so that the trust of The Reader over the
research can be maintained for a long time. It is the responsibility of the researcher to take care
of all the selected data in an appropriate manner. This behaviour of the researcher is assisted in
carrying out the further research in a sophisticated way. However, that is face to face the issue of
plagiarism and violation of copyright act in order to gather the data regarding the research topic
by using secondary sources. This issue has been resolved by the researcher to put the in-text
citation in each paragraph with authenticating references.
Research limitations
There are number of issues can be faced by researcher while completing the research program
which might impact the research study in an adverse way that can influence the result of the
research. Time is a key limitation for the researcher in which the researcher is not active to
collect the data regarding each activity in more effective manner. It is vital for the research to

Business research 13
have the access of the data otherwise it will being the cause of limitations. Money constraint is
another limitation for the research because it is vital for the research to involve in seminar,
conduct research program and many more activities that require money. The less funding the
researcher may be not capable to get way in of data sources from several locations of geographic
to get the research data in explicit process.
Time schedule
S.
No.
Activities Time
frame
(week)
Descriptions
A Elected of the
research topic
1 week It is the begin step in which the topic will be elected for
carrying out the time plan.
B Forecasting of the
research
1 week After electing the topic of the research, the forecast for the
research is been argued in this step in which it finds as the
roadmap that coaches researcher to obtain step in each
movement.
C execution of the 2 The forecast which has been done in the second step will
have the access of the data otherwise it will being the cause of limitations. Money constraint is
another limitation for the research because it is vital for the research to involve in seminar,
conduct research program and many more activities that require money. The less funding the
researcher may be not capable to get way in of data sources from several locations of geographic
to get the research data in explicit process.
Time schedule
S.
No.
Activities Time
frame
(week)
Descriptions
A Elected of the
research topic
1 week It is the begin step in which the topic will be elected for
carrying out the time plan.
B Forecasting of the
research
1 week After electing the topic of the research, the forecast for the
research is been argued in this step in which it finds as the
roadmap that coaches researcher to obtain step in each
movement.
C execution of the 2 The forecast which has been done in the second step will
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Business research 14
selected plan weeks be executed in this step. The plans will be madefor further
needs.
D Collection of the
methods of data
1 week It is essential for the research to amass the data in relation
to the topic. This step will be supportive for the researcher
to go for the suitable strategy and techniques to collect the
data. The combination of Primary and secondary sources
has been considered to bring together the data.
E Data analysis 1 Week After accumulating data with proper method, the data will
be analysed in a valuable manner with the help of
sampling data.
F Discussion 2 week The analysed data will be defined in awell-
organizedprocess to carry out the reaction to the selected
questions of the study of the research.
F Conclusion and
Recommendation
2
weeks
Consistent with the data analysis and discussion, the
conclusion will be drawn and the recommendations will
be made.
selected plan weeks be executed in this step. The plans will be madefor further
needs.
D Collection of the
methods of data
1 week It is essential for the research to amass the data in relation
to the topic. This step will be supportive for the researcher
to go for the suitable strategy and techniques to collect the
data. The combination of Primary and secondary sources
has been considered to bring together the data.
E Data analysis 1 Week After accumulating data with proper method, the data will
be analysed in a valuable manner with the help of
sampling data.
F Discussion 2 week The analysed data will be defined in awell-
organizedprocess to carry out the reaction to the selected
questions of the study of the research.
F Conclusion and
Recommendation
2
weeks
Consistent with the data analysis and discussion, the
conclusion will be drawn and the recommendations will
be made.

Business research 15
Gantt chart
S.No. Activities Duration 1 2 3 4 5 6 7 8 9 10
A Elected of the research topic 1 Week
B Forecasting of the research 1 Week
C execution of the selected plan 2 Week
D Collection of the methods of data 1 Week
E Data Analysis 1 Week
F Discussions 2 Week
G Conclusion and Recommendations 2 Week
Weeks
Gantt chart
S.No. Activities Duration 1 2 3 4 5 6 7 8 9 10
A Elected of the research topic 1 Week
B Forecasting of the research 1 Week
C execution of the selected plan 2 Week
D Collection of the methods of data 1 Week
E Data Analysis 1 Week
F Discussions 2 Week
G Conclusion and Recommendations 2 Week
Weeks

Business research 16
Conclusion
In the limelight of above discussion, it can be concluded that improvement in the internet based
service can develop the higher possibilities of cybercrime. Lack of cyber security can be in the
major challenge for many Organizations in which they can lead into adverse situation.
Hactivism, IoT, DDoS, Smartphone malware, and other threats are being the major reasons of
cyber crimes. It is necessary for the organization to develop the budget for cyber security as it
will be helpful for them to secure the information for the long term. Along with that the
organization should also include the technique of encryption because it facilitates organization as
well as individual to use their personal computer by increasing in the layer of security. The
research methodology section has been defined in a sophisticated manner in which various
approaches and methods have been discussed together with the information regarding the
research topic. The collections of primary and secondary sources have been obtained together
with the information. Along with that, the main focus of the researcher is on the qualitative data
to get the quality in their data along with that the quantitative data has been taken to get the data
in the statistic form.
Conclusion
In the limelight of above discussion, it can be concluded that improvement in the internet based
service can develop the higher possibilities of cybercrime. Lack of cyber security can be in the
major challenge for many Organizations in which they can lead into adverse situation.
Hactivism, IoT, DDoS, Smartphone malware, and other threats are being the major reasons of
cyber crimes. It is necessary for the organization to develop the budget for cyber security as it
will be helpful for them to secure the information for the long term. Along with that the
organization should also include the technique of encryption because it facilitates organization as
well as individual to use their personal computer by increasing in the layer of security. The
research methodology section has been defined in a sophisticated manner in which various
approaches and methods have been discussed together with the information regarding the
research topic. The collections of primary and secondary sources have been obtained together
with the information. Along with that, the main focus of the researcher is on the qualitative data
to get the quality in their data along with that the quantitative data has been taken to get the data
in the statistic form.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Business research 17
Reference list
Berman, S.J., Kesterson-Townes, L., Marshall, A. and Srivathsa, R. (2012). How cloud
computing enables process and business model innovation. Strategy & Leadership, 40(4), pp.27-
35.
Butcher, M. (2014). Here’s What We Know So Far About The Celebrity Photo Hack. [Online]
Tech Crunch. Available at: https://techcrunch.com/2014/09/01/heres-what-we-know-so-far-
about-the-celebrity-photo-hack/ [Accessed 24 April 2018].
Campos, J., Sharma, P., Jantunen, E., Baglee, D., and Fumagalli, L. (2016).The challenges of
cybersecurity frameworks to protect data required for the development of advanced
maintenance’, Procedia CIRP, 47, pp. 222-227.
Chou, T.S. (2013). Security threats on cloud computing vulnerabilities. International Journal of
Computer Science & Information Technology, 5(3), p.79.
Crossman, A., (2017). An Overview of Qualitative Research Methods.ThoughtCo.
Dastjerdi, A.V., Tabatabaei, S.G.H. and Buyya, R. (2012).A dependency‐aware ontology‐based
approach for deploying service level agreement monitoring services in Cloud. Software: Practice
and Experience, 42(4), pp.501-518.
Dinh, H.T., Lee, C., Niyato, D. and Wang, P. (2013). A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), pp.1587-1611.
Reference list
Berman, S.J., Kesterson-Townes, L., Marshall, A. and Srivathsa, R. (2012). How cloud
computing enables process and business model innovation. Strategy & Leadership, 40(4), pp.27-
35.
Butcher, M. (2014). Here’s What We Know So Far About The Celebrity Photo Hack. [Online]
Tech Crunch. Available at: https://techcrunch.com/2014/09/01/heres-what-we-know-so-far-
about-the-celebrity-photo-hack/ [Accessed 24 April 2018].
Campos, J., Sharma, P., Jantunen, E., Baglee, D., and Fumagalli, L. (2016).The challenges of
cybersecurity frameworks to protect data required for the development of advanced
maintenance’, Procedia CIRP, 47, pp. 222-227.
Chou, T.S. (2013). Security threats on cloud computing vulnerabilities. International Journal of
Computer Science & Information Technology, 5(3), p.79.
Crossman, A., (2017). An Overview of Qualitative Research Methods.ThoughtCo.
Dastjerdi, A.V., Tabatabaei, S.G.H. and Buyya, R. (2012).A dependency‐aware ontology‐based
approach for deploying service level agreement monitoring services in Cloud. Software: Practice
and Experience, 42(4), pp.501-518.
Dinh, H.T., Lee, C., Niyato, D. and Wang, P. (2013). A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), pp.1587-1611.

Business research 18
Frank, B., Poese, I., Lin, Y., Smaragdakis, G., Feldmann, A., Maggs, B., Rake, J., Uhlig, S. and
Weber, R. (2013).Pushing CDN-ISP collaboration to the limit. ACM SIGCOMM Computer
Communication Review, 43(3), pp.34-44.
Futter, A. (2016). War Games redux?Cyberthreats, US–Russian strategic stability, and new
challenges for nuclear security and arms control’, European Security, 25(2), pp. 163-180.
Gomes, J. F., Iivari, M., Ahokangas, P., Isotalo, L., and Niemelä, R. (2017). ‘Cybersecurity
Business Models for IoT-Mobile Device Management Services in Futures Digital
Hospitals’, Journal of ICT Standardization, 5(1), pp.107-128.
He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., and Gabrys, B. (2016). The
security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary
computing and other computational intelligence, In Evolutionary Computation (CEC), 2016
IEEE Congress on(pp. 1015-1021). IEEE.
Joglekar, P., and Pise, N. (2016).Solving Cyber Security Challenges using Big
Data’, International Journal of Computer Applications, 154(4) p. 1-4.
Mylrea, M. (2017). Smart energy-internet-of-things opportunities require smart treatment of
legal, privacy and cybersecurity challenges’, The Journal of World Energy Law and
Business, 10(2), pp. 147-158.
Shackelford, S. J. (2016). Business and cyber peace: We need you!, Business Horizons, 59(5),
pp. 539-548.
Thomas, J. A., (2015). Using unstructured diaries for primary data collection.Nurse researcher,
vol. 22, no. 5, pp. 25.
Turkenburg, J. P. &McAuley, K. E., (2013).Data collection and
processing.ActaCrystallographica Section D, vol. 69, no. 7, pp. 1193-1194.
Frank, B., Poese, I., Lin, Y., Smaragdakis, G., Feldmann, A., Maggs, B., Rake, J., Uhlig, S. and
Weber, R. (2013).Pushing CDN-ISP collaboration to the limit. ACM SIGCOMM Computer
Communication Review, 43(3), pp.34-44.
Futter, A. (2016). War Games redux?Cyberthreats, US–Russian strategic stability, and new
challenges for nuclear security and arms control’, European Security, 25(2), pp. 163-180.
Gomes, J. F., Iivari, M., Ahokangas, P., Isotalo, L., and Niemelä, R. (2017). ‘Cybersecurity
Business Models for IoT-Mobile Device Management Services in Futures Digital
Hospitals’, Journal of ICT Standardization, 5(1), pp.107-128.
He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., and Gabrys, B. (2016). The
security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary
computing and other computational intelligence, In Evolutionary Computation (CEC), 2016
IEEE Congress on(pp. 1015-1021). IEEE.
Joglekar, P., and Pise, N. (2016).Solving Cyber Security Challenges using Big
Data’, International Journal of Computer Applications, 154(4) p. 1-4.
Mylrea, M. (2017). Smart energy-internet-of-things opportunities require smart treatment of
legal, privacy and cybersecurity challenges’, The Journal of World Energy Law and
Business, 10(2), pp. 147-158.
Shackelford, S. J. (2016). Business and cyber peace: We need you!, Business Horizons, 59(5),
pp. 539-548.
Thomas, J. A., (2015). Using unstructured diaries for primary data collection.Nurse researcher,
vol. 22, no. 5, pp. 25.
Turkenburg, J. P. &McAuley, K. E., (2013).Data collection and
processing.ActaCrystallographica Section D, vol. 69, no. 7, pp. 1193-1194.

Business research 19
Vogel, R. (2016). Closing the cybersecurity skills gap, Salus Journal, 4(2), pp. 32.
Yang, S. C., and Wen, B. (2017). Toward a cybersecurity curriculum model for undergraduate
business schools: A survey of AACSB-accredited institutions in the United States’, Journal of
Education for Business, 92(1), pp. 1-8.
Vogel, R. (2016). Closing the cybersecurity skills gap, Salus Journal, 4(2), pp. 32.
Yang, S. C., and Wen, B. (2017). Toward a cybersecurity curriculum model for undergraduate
business schools: A survey of AACSB-accredited institutions in the United States’, Journal of
Education for Business, 92(1), pp. 1-8.
1 out of 19
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.