Importance Of Cyber Security In Organizations

Objectives of the Research

The report is developed aiming to gather relevant set of data in relation with data security. Data security is one of the most important aspects attached with the organization because there are various set of hackers available in the market who can hack the data and affect the progress of the company (Horowitz and Lucero, 2016). Technological advancement is changing many of the things due to which requirements of the company are also changing. All the aspects of the company are going online and each and every detail is being saved on the online tracking systems because companies find it convenient to manage the things by tracking as well as tracing them with the help of online services (Kim and Chung, 2013). The research proposal prepared by the researcher will provide an outline of actual research which will be initiated by the researcher in near future. Research proposal prepared by the researcher will help in identifying all the important aspects which are required to be taken into consideration while developing the actual research. Assurance will be provided to the researcher with the help of which work could be managed in a more effective way and help could be provided to the targeted users available in the market (Kuwana, 2012).

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Every research is based on several objectives as without objectives a research does not have any scope. In the same manner the research conducted by the researcher also have certain set of objectives which are required to be fulfilled (Lehto, 2013). The research will be based on these objectives and with the help of the data collected these objectives will be fulfilled by the researcher.

  • The research is developed so as to identify and evaluate the reasons behind cyber security breaches which affect the organizations.
  • To identify and evaluate various acts developed by the legal authorities so as to manage the data security and help in maintaining records in a secure way.
  • To identify and evaluate the measures which could be used by the organizations to reduce cyber crimes (Parajuli, 2008).

The scope of the research is to identify the cyber crimes which could incur at the workplace and could affect the data of the organization. The research report developed by the research will help in analyzing the academic knowledge gained by the researcher in his academic career. It will help in evaluating that what knowledge researcher has gained in his academic career (Partas and Pavlenko, 2014).

Literature review is the section developed by the researcher in which previous researches and studies are being reviewed and justification on the basis of the reviews is being provided. This section of the researcher will provide a direction with the help of which decisions will be made by the organizations available in the market (Raggad, 2010). Various literatures performed by the experts and researchers in the previous period will be reviewed on the basis of which justification will be provided by the researcher. In previous report researcher has evaluated some theoretical information related with cyber security which will be reviewed in this section on the basis of the reviewed information justification will be provided and a trail will be made that all the gaps and loops could be tracked and removed by the researcher in this section of the research proposal (Samuels and Rohsenow, 2015).

Scope of the Research

It could be evaluated that cyber security has become one of the most important aspects in present scenario because with the change in time technology is changing and the market is becoming digital (Tsoumas and Gritzalis, 2012). In this digital market companies are going online and prefer to track all set of company’s information online. In today’s age digitalization is taking place which is helping the organizations in shifting towards the digital space due to which it is becoming that the organizations should take the cyber security into consideration (Voeller, 2014).

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Organizations are going online and are moving on the path of digitalization and to manage the things they are trying to apply all the security aspects at the workplace (Vogt, 2010). Digitalization is not helping the organizations in keeping the track records of the information but it is also giving rise to the hackers. With the change in technology numbers of hackers are also increasing in the cyber world. They are gaining skills to hack the devices and tracking the information of the companies. Hackers available in the market are becoming the matter of concern for the organizations as they are indulging in the activities which are increasing cyber crime and are having a direct impact on the work of the companies as they hack the systems and misuse the data gathered by them (Alsayed, Maguire-Wright and Flickinger, 2016).

As technological advancement is increasing day by day so the cyber crimes are also increasing due to which it has become important for the organizations to maintain the cyber security. Working towards to adopt the technology with the help of which cyber crimes could get reduced has become the responsibility of the organizations (Britz, 2009). The report which is developed by the researcher includes the information related with the institute for Security Technology Studies at Dartmouth University which avails the training of how the organizations could work towards to reduce the risk of cyber attacks on the online data of the company (Cleary and Felici, 2015).

The institute helps in resolving the issues and is focusing upon developing the data security software and tracing the IP Address of the systems from which cyber attacks are being done by the hackers. These Universities helps in developing the a data security framework for the organizations which keeps the track records of the works as well as financial data with the help of the which organizations could manage the work in a proper way. Research also involves data related with the industries which are at the high risk of the cyber attack (Horowitz and Lucero, 2016).  These industries are software industry remains at the 45% of the risk, Hotel and Hospitality remains at the 8% risk, Video Games industry remains at the 7% risk, E-Commerce remains at the 7% risk, Environment remains at the 6% risk, Web Hosting remains at 12%, Internet Services remains at the 10% risk, Restaurant remains at 2%, Rural remains at the 2% risk and other industries remains at 1% risk.

Literature Review

Information related with various surveys conducted in past years is being shared by the researcher in the report which helps making the concrete data for the target users. Research includes all the aspects of discussion with the effect of which effective decisions could be taken by the organization and proper setup of cyber security could be made (Kim and Chung, 2013).

The report developed by the researcher involves all set of information related with cyber security which could help in developing the content for the actual research. All facts and figures are being availed in the report which is enhancing the concreteness of the content developed by the researcher. Information from various secondary resources are being gathered by the researcher with the effect of which companies could get relevant set of support as well as help in managing the online security system (Kuwana, 2012). In the report data related with various methods could be adopted by the organizations so as to keep the data secure are being availed. These methods will help in keeping the system secure and safe from all the vulnerabilities which could infect the systems of the company and could lead to cause huge loss to the same. Hence, it could be said that the research which will be conducted on the basis of the available report will ensure to provide sufficient amount of information and will help the organizations in adopting the appropriate methods with the help of which their systems will remain safe and secure (Lehto, 2013).

Research questions are being developed by the researchers which are required to be answered. With the help of the research developed solution to these questions will be provided by the researcher. Solution to the research will ensure to help the researcher in obtaining the objectives targeted by the researcher due to which effective data will be shared in the market (Parajuli, 2008).

What are the reasons due to which cyber attacks takes place in the organizations and how the information is being hacked by the hackers?

What are the acts and legal aspects attached which are attached with the data security at the workplace and how these could be applied at the workplace?

What are the measures and methods which could be adopted by the organizations to stop cyber crimes and attacks at the workplace?

The data which is being formulated with the help of secondary sources and from the previous studies and is being presented in the theoretical form is known as qualitative research. Qualitative research will ensure to provide a proper support to the target users in gaining proper data related with cyber security and the activities of cyber crime. Opinions and decisions related with the past researches are being provided in the qualitative research which helps in analyzing all set of loops and gaps (Partas and Pavlenko, 2014). Qualitative research also helps in removing all set of loops and gaps and provides the support system to the targeted users available in the market.

Reasons for Cyber Attacks

Certain secondary sources which were used by the researcher to gather the data for the research on cyber security are books available on the same topic, journals and articles availed in the newspaper and magazines and mass information is being gathered by the researcher with the help of the sources available in internet (Raggad, 2010).

For an effective research it is important that quantitative data should be provided by the researcher. Numerical data and facts related with the research topic will be availed with the help of quantitative research. Raw data will be produced by the researcher so as to gather the data related with the research content (Samuels and Rohsenow, 2015).

Primary source of data collection will be used and these sources are interview method, questionnaire development and taking responses from the sample selected by the researcher.

Random sampling technique will be used by the researcher so as to produce and develop quantitative research. Sample size of 50 people is being selected by the researcher so as to collect primary data related with the research (Tsoumas and Gritzalis, 2012).

Time and money are the main limitations of the research. Researcher does not have proper time and money so as to formulate appropriate research and collect the information. Unavailability of proper resources and time will have a huge impact on the research content which will affect the authenticity of the research (Voeller, 2014). It could be possible that the sample size selected by the researcher will not provide effective set of information related with the research topic due to which reliability and validity of the report get affected.

Research Activities

Initiation Time

Completion Time

Planning Research Proposal

May 11, 2017

Jun 5, 2017

Developing Research Objectives

May 11, 2017

May 12, 2017

Developing Project Scope

May 12, 2017

May 16, 2017

Reviewing the Literature

May 16, 2017

May 25, 2017

Developing Research Question

May 26, 2017

May 29, 2017

Developing Research Methodology

May 29, 2017

Jun 5, 2017

(Vogt, 2010)

                     

Conclusion:

With the help of the research formulated by the researcher it could be concluded that researcher should develop such type of plans and procedures before working on the main aspects of the research. This proposal of the research will help the researcher in developing effective content and will ensure to avail proper guidance to manage the research in an effective way.

References:

Alsayed, I., Maguire-Wright, K. and Flickinger, K. (2016). Utilizing Secondary Data Sources In Combination With Primary Clinical Data To Optimize Data Collection In Prospective Study Designs. Value in Health, 19(3), 108.

Britz, M. (2009). Computer forensics and cyber crime. Upper Saddle River NJ: Pearson.

Cleary, F. and Felici, M. (2015). Cyber Security and Privacy. Cham: Springer International Publishing.

Horowitz, B. and Lucero, D. (2016). SYSTEM-AWARE CYBER SECURITY: A SYSTEMS ENGINEERING APPROACH FOR ENHANCING CYBER SECURITY. INSIGHT, 19(2), 39-42.

Kim, K. and Chung, K. (2013). IT Convergence and Security 2012. Dordrecht: Springer.

Kuwana, T. (2012). Repetition advantage and disadvantage in perceptual identification tasks. Japanese Psychological Research, 55(3), 216-228.

Lehto, M. (2013). The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies. International Journal of Cyber Warfare and Terrorism, 3(3), 1-18.

Parajuli, B. (2008). Questionnaire: A Tool of Primary Data Collection. Himalayan Journal of Sociology and Anthropology, 1, 51.

Partas, V. and Pavlenko, A. (2014). Data support of design of details production techniques. Collection of Scientific Publications NUS, 0(3). 122-133

Raggad, B. (2010). Information security management. Boca Raton, Fla.: CRC Press.

Samuels, D. and Rohsenow, T. (2015). Cyber security. New York: Arcler Press.

Tsoumas, B. and Gritzalis, D. (2012). Inside Cyber Warfare: Mapping the Cyber Underworld. Computers & Security, 31(6), 801.

Voeller, J. (2014). Cyber Security. Wiley.

Vogt, W. (2010). Data collection. Los Angeles: SAGE.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP