The research proposal shall discuss and explicate the cyber security challenges faced by the retailer Kmart, Australia in the recent time. The proposal explores the problems of cyber security that is accelerating at a rapid pace. Subsequently, the cyber topography is becoming excessively convoluted and profoundly affecting the business domain (Von and Van 2013). The cyber security is a problematic sphere and it gravely influences the financial sectors. The expansive corporations, government agencies and financial institutions become the potential targets of Advanced Persistent Threat (APT), phishing assaults and Distributed Denial of Services (DDOS) (Klimoski 2016).
In the recent time, the retail chain, Kmart in Australia witnessed serious business challenges related to the cyber security. These cyber issues have gravely jeopardized the organizational structure of the leading Australian retain chain, Kmart. The developed countries such as United States of America, United Kingdom, Mexico and Australia have countenanced cyber troubles. Therefore, cyber security challenges pose a serious threat to the business domain.
It is indispensable to augment the cyber security potentialities over the past five years. Initially, formal mechanisms have been used to identify potential IT threats and establish strategies of mitigation. In the same way, scores of dollars have been used to implement these organizational strategies. Over the past five years, the cyberspace has undergone wide ramifications and modifications. In the recent time, the ‘Desktop environment’ sees a glimmering revolution and is superseded by the phase of laptop and minicomputer. At the same time, the USB ports become disabled and the Web mail service is defunct (Gordon et al. 2014). In the present era, effective technologies are used to identify potential threats in the business sectors. In the banking and financial sectors, cyber threats have gained varied contours like phishing, scamming and hacking of banking details (Osborn 2014). The cyber security threat becomes a negative phenomenon that culminates in the development of serious criminal problems across the globe (Zubilevych 2017). The business and financial sectors should adopt punitive measures that shield the business platforms from ensuing cyber threats (Wang et al. 2015).
The research proposal shall reconnoitre possible cyber security threats that are detrimental to the business forums and financial sectors. The research proposal specifies the cyber security challenges faced by the retailer Kmart, Australia. The proposal discusses and explains the cyber problems faced by the retail and e-commerce units of Australia. The research will be conducted by intersecting past literary surveys and recent technological patterns. It will be formed on the basis of qualitative data analysis. In the end, the research shall recommend punitive measures that will shield the cyberspace from any violent assault.
The aims and objectives of the project are as follows:
The research literature analyses the evolving terrain of cyberspace crimes that have damaged the reputation of online retailers and e-commerce hubs (Klimburg 2013). It discusses about the reality of cyber challenges that permeate the digital landscape. The Connolly report shows that the cyberspace crime is entrenched in the Australian companies in 2015-16 (Connolly 2016). In the report, the companies specified that they cyber crime has foiled their efforts for securing a reputed position in the global market. Gandhi (2011) suggests that every company is software dependent, which makes the cyber forum vulnerable to potential technology threats. They claim that the cyber security attacks are instigated by political, social and cultural factors. These factors culminate in the development of cyberspace problems in the recent time (Gandhi et al. 2011).
The research literature identifies key challenges that are detrimental to the cyberspace problems. These challenges are discussed widely in the literature review section. Due to the persistence of these potential threats, the cyberspace security of certain retail companies like Kmart, Australia is at stake. In the ensuing paragraphs, I shall posit some crucial questions that have hitherto not been raised in this domain.
Based on the scope and objectives of the project, the research hypothesis shall be adumbrated in the particular study.
Research design identifies the particular research problem that leads to the preparation of the research project (Creswell 2013). In this particular project, I shall specify the research problem that is indispensable for the conduct of the research.
The methodology of research is the variant of research method used by the researchers. The methodology of research functions at the integration of theoretical and empirical models. These two models are integral to determining the research course (Mackey and Grass 2016).
There are three types of investigation:
The Investigative or explorative model explicates that the researcher should have a clear cognizance of the research topic. The researcher will accomplish the subject based on scientific analysis.
The Discursive or theory-oriented model expounds the close intersection between theoretical conceptualization and practical experimentation. The researchers outline the research with the assistance of apposite theories and research frameworks.
In the Hypothesis oriented model, the researcher elucidates a theorem. Based on the cumulative results of the theorem, the researchers initiate the study process.
The researcher situates his research questions within a broad discursive ambit. Based on the appropriate theories and concepts, the researcher explains the research questions and the theme of the study.
Data forms an important part of the research. The researcher moulds the study by integrating secondary and primary data. Primary data is the assemblage of significant data from the survey questionnaires. On the other hand, the secondary data gives a stimulus to the researcher for establishing a new angle in the subject (Crumbley and Church 2013)
For this research, the researcher will conduct a research on the affected retailers and the e-commerce platforms. At the same time, the researcher will extract information from the popular corporations (such as KPMG, Wipro and Infosys) and delve into their logistic chains for better understanding of the problem.
Bernard (2016) claims that there are two types of sampling method for accomplishing the research study. These are enumerated as:
As far as research is concerned, the researcher will apply non-probability method. The research will use a bunch of employees of both retail and logistic sections.
To the extent availability issues are concerned, the researcher confronts issues identifying with the conceivability and clarity of the pertinent assets. The behavioural reaction gotten from the interviewees is a noteworthy piece of the exploration.
For directing the exploration, it is essential for the specialist to organize moral introduce all through the procedure. As indicated by the Data Protection Act, 1988, an analyst needs to keep up the privacy of the unpublished work while directing the examination. The analyst ought not to reveal the detail of the respondents. They are under a strict impulse to keep up the mystery of the procedure.
Data Analysis plan includes two factors, namely,
To the extent this examination is concerned, the scientist should apply subjective information investigation technique. The examination investigation depends on the subjective component. In this way, the scientist needs to receive subjective information investigation approach. The strategy has no numerical figuring. As far as this exploration is concerned; the analyst should utilize subjective information investigation approach. The investigation of the exploration point is commenced on the subjective aspect. In this manner, the scientist needs to choose the subjective information examination strategy. The technique does not involve scientific computation. The subject decrease offers of nearby shops because of web based shopping require subjective information investigation technique. The examination compares hypotheses and commonsense reactions for supporting the theme.
The planned thesis shall contain five sections.
Research limitations are the shortcomings or dearth that the researcher counters during the course of the research. As far as this research is concerned, the researcher will definitely face some research limitations that are vindictive for him. In this case, the researcher will find it difficult to ascertain whether the logistic chains use any corruptive practices to extract information from the corporation. The researcher has to make a hypothetical picture for this sector.
Conclusion
Summing up, in the recent time, the retail chain, Kmart in Australia witnessed serious business challenges related to the cyber security. These cyber issues have gravely jeopardized the organizational structure of the leading Australian retain chain, Kmart. The developed countries such as United States of America, United Kingdom, Mexico and Australia have countenanced cyber troubles. Therefore, cyber security challenges pose a serious threat to the business.
References
Bernard, H.R., Wutich, A. and Ryan, G.W., 2016. Analyzing qualitative data: systematic approaches. SAGE Publications
Creswell, J.W., 2013. Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications.
Cumbley, R. and Church, P., 2013. Is “Big Data” creepy? Computer Law & Security Review, 29 (5), 601–609.
Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q. and Laplante, P., 2011. Dimensions of cyber-attacks: Cultural, social, economic, and political. IEEE Technology and Society Magazine, 30(1), pp.28-38.
Gordon, L.A., Loeb, M.P., Lucyshyn, W. and Zhou, L., 2014. Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model. Journal of Information Security, 6(01), p.24
Klimburg, A., 2013. National cyber security framework manual.
Klimoski, R., 2016. Critical Success Factors for Cybersecurity Leaders: Not Just Technical Competence. People and Strategy, 39(1), p.14.
Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design. Routledge
Osborn, E., 2014. Business versus technology: Sources of the perceived lack of cyber security in SMEs.
Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security. Computers & Security, 38, pp.97-102.
Wang, P., Ali, A. and Kelly, W., 2015, August. Data security and threat modeling for smart city infrastructure. In Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on (pp. 1-6). IEEE.
Zubilevych, A.V., 2017. Cyber SECURITY in Business.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download