Business Research Methods: Understanding The Planning Process, Professional Ethics, And Methodologies

Demonstrate an understanding of the research planning process and business research methods

Here, I am going to talk about my learning and my learning experiences from the business researches (advantages and disadvantages of business outsourcing function and challenges in cyber security for business) done. In this assignment, I talk about the effectiveness and usefulness of my learning experience. Further, I evaluate my learning and learning process and explain a plan that I will apply in the future for the development of career and professional life.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

My opinion about the learning experience gathered fromassignment 1, is outsourcing has become a contemporary buzzword of the present day, as most of the quality-concerned business organisations are outsourcing their non-core businesses. The main factor influence organisation to outsource their operations is save cost and higher expenses. However, the benefits differ from one organisation to another. The shifting of organisational also shifts power, which is one of the negative aspects of outsourcing. My opinion about the learning experience gained from assignment 2 is, with rapid technological development, business organisations have become more inclined toward running their business digitally. Dunn Cavelty (2013) stated that it increases the threat of cyber insecurity if appropriate policies and procedures regarding cyber security are not implemented at the primary phase. Von Solms and Van Niekerk(2013) has pointed out some important challenges of cyber security, including, hacking, hacktivism, ransomware those affect the day-to-day operations carried out by companies and create legal issues for them.

The experiences I have gathered from both the business researches are extremely valuable or me, as it helped to explore my knowledge pertaining to two latest and important topics of present day business. While doing my own business, I can apply my experience in making important and error free business decisions. I will consider the drawbacks of outsourcing before taking any related decision. Moreover, the challenges associated with cybersecurity will guide me in placing all the necessary procedures and policies related to cyber security when I will explore my career as a business person.

From the first assignment, I have learned the advantages and disadvantages of outsourcing. Further, I have learned about the process of writing a literature review. The second assignment not only enriched my knowledge with the challenges related to cybersecurity and the way they can be addressed, but it also gave me knowledge regarding carrying put a research, selecting sample size and choosing an appropriatedata collection method. All these learning processes will help me in my future courses, where I may have to carry out a research.

Besides, the knowledge and experience about cyber security and outsourcing will give me significant advantages in my future career. I can use my learning experience and processes in running my business competently. As stated by Moet al. (2012), in order to run a business that is secured from cyber threats, there must be both technically and corporeal security policies within the organisation. Therefore, to avoid the challenges of incorporating security methods after being attacked, it will be necessary for meto employ the security system while developing operations of the online business. Not only in business life, but I can use the learning process in personal life too. I can protect my personal accounts on social networking sites by applying my learning process.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Understand the importance of professional ethics and how to recognize and address ethical issues in a business research project

Holweg and Pil (2012) stated that, sometimes, the outsourcing partner may disclose confidential information regarding the firm for earning the higher profit that can be harmful to the firm, which is involved in outsourcing its business operations. Therefore, when I will start my career, I should remember this challenge before engaging in outsourcing and I will make a legal contract with my outsourcing partner that it cannot reveal any confidential information about my company, as it will be unethical.

In the two assignments, I carried out extensive researches regarding the advantages and disadvantages of outsourcing andthreats in cyber security in business. I have done literature reviews on both the topics. I have critically analysed the different aspects related to outsourcing and cyber security. I gathered information regarding the benefits and challenges of outsourcing and threats of cyber security in business from previously published different books, journals and from websites.

I read journals and business articles on outsourcing, where I have seen that a number of scholars are talking about the benefits of outsourcing, where some of them are against this practice. For example, according to Willcocksand Cullen(2013), outsourcing helps business companies to obtain skilled labours to perform their business activities at a cheaper rate. On the other hand, Lacity and Willcocks (2013) argued that outsourcing may create unhealthy relationships, inferior use of modern technology and skills and talent of the employees.

During my learning session, I have heard about the challenges related cyber security and its impact on business from my professors. They have said that a huge number of devices are connected with the computer, due to ransomware and activism, there is a huge possibility of hacking of these devices. On the other hand,Wu and Irwin (2016) commented that with technological advancement, it has become easier or businesses to grasp the opportunity of direct integration of somatic lives and computer related systems.

The business researches, I have conducted have helped me to learn the way of writing a literature review. I came to know about the way searching information regarding a research topic from various sources of information. Applying the knowledge, I collected information on the two concerned research topics, challenges in cyber security and benefits and challenges associated with outsourcing. Discussing the topic from the viewpoints of different scholars and authors have provided me with a greater knowledge and learning on the two concerned research topics.

Further, I have learned about the way of carrying out a primary research. First, I need to select the process of data collection, sampling techniques and other important tools related to research. Then I need to select the sample size using the sampling technique. Further, a questionnaire needs to be developed that are to be answered by the selected sample size. For example, while carrying out the research on the challenges of cyber security I used convenient sampling method and selected a group of people for discussion with a questionnaire contains 15 to 20 questions.

From both business types of research, I have learned a significant number of things, which are important to run a business successfully in the present competitive business environment. I have learned the importance of taking applying measures for averting challenges related to cyber security and the challenges related to outsourcing those must be considered before outsourcing business operations.

Evaluate the impact of existing business research in a business environment

I particularly carried outresearches on the challenges and advantages of outsourcing and the threats associated with cyber security in business, as these two are the mostdiscussed topics of contemporary business.

Technological development has provided significant opportunities and advantages to business organisations in targeting customers, understanding their needs, expanding businesses, promoting products and services in national and international markets and so on. Besides the advantages, it possesses some significant threats for the business (Chenet al. 2012). Therefore, understanding the ways of avoiding these threats is crucial for the business organisations and me, as I want to pursue my career in business. Moreover, I have understood the benefits of outsourcing along with its disadvantages. Hence, I carried out a literature review in assignment 1 for analysing the advantages and disadvantages of outsourcing. Similarly, in assignment 2, I have done a literature review of risks related to cyber security. Here, I have also raised researchquestion, toward which the research activities to be done. Further, I selected tools and techniques required for carrying out the research appropriately and achieving the research objectives. Further, a time schedule for carrying out the research objectives in a sequential manner is also developed.

I feel that, for running a business successfully, it is crucial to take appropriate measures and initiatives. Massini and Miozzo(2012) commentedthat the marketers need to apply a proactive approach for anticipating the potential risks and threats that may come from outsourcing or due to lack of measures taken for cyber security.It is connected with the learning related to maintaining operational efficiency and earning customer satisfaction.Shantz and Tomblin(2014) stated thatcyber security policies help to protect customer data, financial transaction and their personal information from being hacked. Hence, it will make customers feel safe while dealing with the organisation.

If I fail to incorporate appropriate cyber security measures in my business, then it may bring significant harm to my business and my career.

I will apply my learning to my future profession (a businessperson). While carrying out outsourcing, I will utilise the following steps:

  • First, I will make a plan of operations to be outsourced and the required skills and qualifications to complete them.
  • The second step is choosing  suitable outsourcing partners, who fulfill the required criteria (contractors’ experience, occupational health and safety policies, regular supervision) (Dinu, 2015)
  • In the next stage a meeting for discussing the expectations from the partner needs to be held (Oshriet al.2015)
  • I will supervise whether the operations are being done as per the agreement and maintaining quality standard
  • Finally, I will hire an auditor to examine whether the works are completed appropriately

For maintaining cyber security, I will apply the following processes:

  • Change default account names and passwords while installing computer systems
  • Update the computer operating system
  • Using encryption software for securing customer related information from being theft while transaction
  • Using of sensitive information will be limited to specific people

Conclusion

Both the business researches have explored my knowledge regarding the opportunities and threats of carrying out online business and outsourcing. I can use the knowledge for my career development in the future.

References

Chen, H., Chiang, R.H. and Storey, V.C., 2012. Business intelligence and analytics: From big data to the big impact.MIS quarterly, 36(4), pp.1165-1188.

Dinu, A.M., 2015. The risks and benefits of outsourcing. Knowledge Horizons.Economics, 7(2), p.103.

Dunn Cavelty, M., 2013. From Cyber?Bombs to Political Fallout: Threat Representations with an Impact in the Cyber?Security Discourse. International Studies Review, 15(1), pp.105-122.

Holweg, M. and Pil, F.K., 2012. Outsourcing complex business processes. California Management Review, 54(3), pp.98-115.

Lacity, M.C. and Willcocks, L.P., 2013. Outsourcing business processes for innovation. MIT Sloan management review, 54(3), p.63.

Massini, S. and Miozzo, M., 2012.Outsourcing and offshoring of business services: challenges to theory, management and geography of innovation.Regional Studies, 46(9), pp.1219-1242.

Mo, Y., Kim, T.H.J., Brancik, K., Dickinson, D., Lee, H., Perrig, A. and Sinopoli, B., 2012. Cyber–physical security of a smart grid infrastructure.Proceedings of the IEEE, 100(1), pp.195-209.

Oshri, I., Kotlarsky, J. and Willcocks, L.P., 2015. The Handbook of Global Outsourcing and Offshoring 3rd edition.Springer.

Shantz, J. and Tomblin, J., 2014. Cyber Disobedience: Re. Presenting Online Anarchy.

Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security. Computers & Security, 38, pp.97-102.

Willcocks, L. and Cullen, S., 2013. Intelligent IT outsourcing.Routledge.

Wu, C.H.J. and Irwin, J.D., 2016. Introduction to computer networks and cybersecurity. CRC Press

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP