The report is developed aiming to gather relevant set of data in relation with data security. Data security is one of the most important aspects attached with the organization because there are various set of hackers available in the market who can hack the data and affect the progress of the company (Horowitz and Lucero, 2016). Technological advancement is changing many of the things due to which requirements of the company are also changing. All the aspects of the company are going online and each and every detail is being saved on the online tracking systems because companies find it convenient to manage the things by tracking as well as tracing them with the help of online services (Kim and Chung, 2013). The research proposal prepared by the researcher will provide an outline of actual research which will be initiated by the researcher in near future. Research proposal prepared by the researcher will help in identifying all the important aspects which are required to be taken into consideration while developing the actual research. Assurance will be provided to the researcher with the help of which work could be managed in a more effective way and help could be provided to the targeted users available in the market (Kuwana, 2012).
Every research is based on several objectives as without objectives a research does not have any scope. In the same manner the research conducted by the researcher also have certain set of objectives which are required to be fulfilled (Lehto, 2013). The research will be based on these objectives and with the help of the data collected these objectives will be fulfilled by the researcher.
The scope of the research is to identify the cyber crimes which could incur at the workplace and could affect the data of the organization. The research report developed by the research will help in analyzing the academic knowledge gained by the researcher in his academic career. It will help in evaluating that what knowledge researcher has gained in his academic career (Partas and Pavlenko, 2014).
Literature review is the section developed by the researcher in which previous researches and studies are being reviewed and justification on the basis of the reviews is being provided. This section of the researcher will provide a direction with the help of which decisions will be made by the organizations available in the market (Raggad, 2010). Various literatures performed by the experts and researchers in the previous period will be reviewed on the basis of which justification will be provided by the researcher. In previous report researcher has evaluated some theoretical information related with cyber security which will be reviewed in this section on the basis of the reviewed information justification will be provided and a trail will be made that all the gaps and loops could be tracked and removed by the researcher in this section of the research proposal (Samuels and Rohsenow, 2015).
It could be evaluated that cyber security has become one of the most important aspects in present scenario because with the change in time technology is changing and the market is becoming digital (Tsoumas and Gritzalis, 2012). In this digital market companies are going online and prefer to track all set of company’s information online. In today’s age digitalization is taking place which is helping the organizations in shifting towards the digital space due to which it is becoming that the organizations should take the cyber security into consideration (Voeller, 2014).
Organizations are going online and are moving on the path of digitalization and to manage the things they are trying to apply all the security aspects at the workplace (Vogt, 2010). Digitalization is not helping the organizations in keeping the track records of the information but it is also giving rise to the hackers. With the change in technology numbers of hackers are also increasing in the cyber world. They are gaining skills to hack the devices and tracking the information of the companies. Hackers available in the market are becoming the matter of concern for the organizations as they are indulging in the activities which are increasing cyber crime and are having a direct impact on the work of the companies as they hack the systems and misuse the data gathered by them (Alsayed, Maguire-Wright and Flickinger, 2016).
As technological advancement is increasing day by day so the cyber crimes are also increasing due to which it has become important for the organizations to maintain the cyber security. Working towards to adopt the technology with the help of which cyber crimes could get reduced has become the responsibility of the organizations (Britz, 2009). The report which is developed by the researcher includes the information related with the institute for Security Technology Studies at Dartmouth University which avails the training of how the organizations could work towards to reduce the risk of cyber attacks on the online data of the company (Cleary and Felici, 2015).
The institute helps in resolving the issues and is focusing upon developing the data security software and tracing the IP Address of the systems from which cyber attacks are being done by the hackers. These Universities helps in developing the a data security framework for the organizations which keeps the track records of the works as well as financial data with the help of the which organizations could manage the work in a proper way. Research also involves data related with the industries which are at the high risk of the cyber attack (Horowitz and Lucero, 2016). These industries are software industry remains at the 45% of the risk, Hotel and Hospitality remains at the 8% risk, Video Games industry remains at the 7% risk, E-Commerce remains at the 7% risk, Environment remains at the 6% risk, Web Hosting remains at 12%, Internet Services remains at the 10% risk, Restaurant remains at 2%, Rural remains at the 2% risk and other industries remains at 1% risk.
Information related with various surveys conducted in past years is being shared by the researcher in the report which helps making the concrete data for the target users. Research includes all the aspects of discussion with the effect of which effective decisions could be taken by the organization and proper setup of cyber security could be made (Kim and Chung, 2013).
The report developed by the researcher involves all set of information related with cyber security which could help in developing the content for the actual research. All facts and figures are being availed in the report which is enhancing the concreteness of the content developed by the researcher. Information from various secondary resources are being gathered by the researcher with the effect of which companies could get relevant set of support as well as help in managing the online security system (Kuwana, 2012). In the report data related with various methods could be adopted by the organizations so as to keep the data secure are being availed. These methods will help in keeping the system secure and safe from all the vulnerabilities which could infect the systems of the company and could lead to cause huge loss to the same. Hence, it could be said that the research which will be conducted on the basis of the available report will ensure to provide sufficient amount of information and will help the organizations in adopting the appropriate methods with the help of which their systems will remain safe and secure (Lehto, 2013).
Research questions are being developed by the researchers which are required to be answered. With the help of the research developed solution to these questions will be provided by the researcher. Solution to the research will ensure to help the researcher in obtaining the objectives targeted by the researcher due to which effective data will be shared in the market (Parajuli, 2008).
What are the reasons due to which cyber attacks takes place in the organizations and how the information is being hacked by the hackers?
What are the acts and legal aspects attached which are attached with the data security at the workplace and how these could be applied at the workplace?
What are the measures and methods which could be adopted by the organizations to stop cyber crimes and attacks at the workplace?
The data which is being formulated with the help of secondary sources and from the previous studies and is being presented in the theoretical form is known as qualitative research. Qualitative research will ensure to provide a proper support to the target users in gaining proper data related with cyber security and the activities of cyber crime. Opinions and decisions related with the past researches are being provided in the qualitative research which helps in analyzing all set of loops and gaps (Partas and Pavlenko, 2014). Qualitative research also helps in removing all set of loops and gaps and provides the support system to the targeted users available in the market.
Certain secondary sources which were used by the researcher to gather the data for the research on cyber security are books available on the same topic, journals and articles availed in the newspaper and magazines and mass information is being gathered by the researcher with the help of the sources available in internet (Raggad, 2010).
For an effective research it is important that quantitative data should be provided by the researcher. Numerical data and facts related with the research topic will be availed with the help of quantitative research. Raw data will be produced by the researcher so as to gather the data related with the research content (Samuels and Rohsenow, 2015).
Primary source of data collection will be used and these sources are interview method, questionnaire development and taking responses from the sample selected by the researcher.
Random sampling technique will be used by the researcher so as to produce and develop quantitative research. Sample size of 50 people is being selected by the researcher so as to collect primary data related with the research (Tsoumas and Gritzalis, 2012).
Time and money are the main limitations of the research. Researcher does not have proper time and money so as to formulate appropriate research and collect the information. Unavailability of proper resources and time will have a huge impact on the research content which will affect the authenticity of the research (Voeller, 2014). It could be possible that the sample size selected by the researcher will not provide effective set of information related with the research topic due to which reliability and validity of the report get affected.
Research Activities |
Initiation Time |
Completion Time |
Planning Research Proposal |
May 11, 2017 |
Jun 5, 2017 |
Developing Research Objectives |
May 11, 2017 |
May 12, 2017 |
Developing Project Scope |
May 12, 2017 |
May 16, 2017 |
Reviewing the Literature |
May 16, 2017 |
May 25, 2017 |
Developing Research Question |
May 26, 2017 |
May 29, 2017 |
Developing Research Methodology |
May 29, 2017 |
Jun 5, 2017 |
(Vogt, 2010)
Conclusion:
With the help of the research formulated by the researcher it could be concluded that researcher should develop such type of plans and procedures before working on the main aspects of the research. This proposal of the research will help the researcher in developing effective content and will ensure to avail proper guidance to manage the research in an effective way.
References:
Alsayed, I., Maguire-Wright, K. and Flickinger, K. (2016). Utilizing Secondary Data Sources In Combination With Primary Clinical Data To Optimize Data Collection In Prospective Study Designs. Value in Health, 19(3), 108.
Britz, M. (2009). Computer forensics and cyber crime. Upper Saddle River NJ: Pearson.
Cleary, F. and Felici, M. (2015). Cyber Security and Privacy. Cham: Springer International Publishing.
Horowitz, B. and Lucero, D. (2016). SYSTEM-AWARE CYBER SECURITY: A SYSTEMS ENGINEERING APPROACH FOR ENHANCING CYBER SECURITY. INSIGHT, 19(2), 39-42.
Kim, K. and Chung, K. (2013). IT Convergence and Security 2012. Dordrecht: Springer.
Kuwana, T. (2012). Repetition advantage and disadvantage in perceptual identification tasks. Japanese Psychological Research, 55(3), 216-228.
Lehto, M. (2013). The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies. International Journal of Cyber Warfare and Terrorism, 3(3), 1-18.
Parajuli, B. (2008). Questionnaire: A Tool of Primary Data Collection. Himalayan Journal of Sociology and Anthropology, 1, 51.
Partas, V. and Pavlenko, A. (2014). Data support of design of details production techniques. Collection of Scientific Publications NUS, 0(3). 122-133
Raggad, B. (2010). Information security management. Boca Raton, Fla.: CRC Press.
Samuels, D. and Rohsenow, T. (2015). Cyber security. New York: Arcler Press.
Tsoumas, B. and Gritzalis, D. (2012). Inside Cyber Warfare: Mapping the Cyber Underworld. Computers & Security, 31(6), 801.
Voeller, J. (2014). Cyber Security. Wiley.
Vogt, W. (2010). Data collection. Los Angeles: SAGE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download