+44 203 318 3300 +61 2 7908 3995 help@nativeassignmenthelp.co.uk

Pages: 7

Words: 1801

Research proposal Assignment

INTRODUCTION

Background

Looking for Help With Assignments in the UK? Look no further than Native Assignment Help. Our team of experienced professionals is dedicated to providing top-notch assistance to students across the UK, ensuring they excel in their academic endeavours.

The business world is becoming technologically advanced day by day and the latest technologies are leading the world towards being highly developed. With the increasing use of technologies, the usage of data had increased to a greater extent for businesses. With better use of technologies and data, the risk for cyberattacks had also increased for the businesses to a greater extent(Kamiya, et. al. 2021).In the current business world, customer data and a lot of other data are important for businesses and if the company faces a cyber-attack then it would create a great loss to the company. In the research, the researcher would explore that what the organizations and individuals can learn from the history of cyberattacks on security and data. The researcher would conduct detailed research for expanding all the concepts related to the research topic.

The rationale of the study

As the number of cases related to the cyberattacks in the organizations is increasing rapidly and as a result of which the businesses are facing significant loss due to the cyber attack, it had become important that the businesses should know regarding the cyberattacks and learn from them due to which this research is being conducted. The motivation behind conducting this research is to provide better knowledge related to cyberattacks and cybersecurity which can prevent businesses from cyberattacks.

Significance of the study

This study is important as it would provide better knowledge related to the cyberattacks which are being faced by businesses and individuals in history and this will help the organizations and individuals in focusing on the safety of the data from the cyberattacks. Along with this the research study would also provide better knowledge related to this research topic to other researchers also.

AIM AND OBJECTIVES

Aim

The present report aims at exploring that what organisations and individuals should learn from the history of cyberattacks on security and data.

Objectives

  • To explore the concept of cyberattacks in detail.
  • To analyze that what is the impact of cyberattacks on the businesses and individuals.
  • To analyse that how cyberattacks being done on the data and security.
  • To explore the concept of cybersecurity in detail.
  • To understand that how the businesses and individuals can prevent cyberattacks.

LITERATURE REVIEW

Cyberattacks had become common in the present era of technological advancement and digitalization. Poushter, and Huang, (2019) had mentioned that the cyber attack is an attack which is being initiated from a computer against any other computer or device which compromises the confidentiality of other computers. In other words it can be said that cyberattack is an assault or retreat operation engaged by the individual or by the organizations for stealing the information or the data which is being stored in a computer information system or the computer networks.

Tweneboah-Kodua, et. al.(2018) had mentioned that in recent decades the cyberattack on businesses had increased to a greater extent. When a cyberattack takes place in any of the company then the organization faced great loss and sometimes the company losses the confidential data of their customers, employees or any other stakeholder. In support of this Tariq, (2018) had mentioned that if the company losses the financial information of the company as a result of the cyberattack then it would have an significant negative impact on the organisation. According to Bada, and Nurse, (2020) if the businesses face any of the cyberattack then it would have an great negative impact on the overall performance of the company and would also create several issues for the organisation.

RESEARCH METHODOLOGY

Researcher methodology is one of the important parts of the research which explain regarding the methods and the procedures used by the researcher for conducting the research in a systematic manner(Ørngreen, and Levinsen, 2017). There are different sub-sections of the researcher methodology which explains in detail regarding the research methodology which are mentioned below such as:

Research design

Research design is being defined as the overall strategy which is being used by the researcher for conducting the research study. Two different types of research designs are present which are qualitative and quantitative research design(Sun, et. al. 2020). The researcher needs to select an appropriate research design on the basis of the aims and objectives of the research study. In the current study, the researcher would focus onqualitative research design. In qualitative research, the researcher focuses on collecting high-quality and in-depth qualitative data for the research study.

Research Approach

 The set of different methods used by the researcher while conducting the research study is being referred to as the research approach. Majorly the research approach is of two types inductive and deductive. When the researcher conducts the research study for the known premises then it is called deductive research approach and on the other hand when the research conducts a for unknown premises then it is known as an inductive research approach. In the present study, the researcher would focus on applying the inductive research approach for conducting the research study.

Research method

The research method is being defined as the process of collecting and analyzing the data for the research study. There are different types of research methods that can be used by the researcher for conducting the research study. In the present study the researcher would use the exploratory research method in which the research topic would be explored in detail for explaining all the different concepts related to it in detail(Nayak, and Singh, 2021).

Data Collection

Data collection is being referred as the method used by the researcher for collecting the data for the research study. In the current study the researcher will focus on using the primary data collection method. Primary data collection is being referred as the process of collecting the data by own. On the other hand, secondary data collection is being referred to as the process of collecting the data from the previous literature which is already published. In the current study, the researcher would conduct the interviews and questionnaire surveys for collecting the primary data for the research study.

Data Analysis

The process of analysing the data which is being collected in the research study is being referred as the data analysis. There are different methods which can be used by the researcher for analyzing the data but in the current study the researcher would focus on applying thematic analysis. In thematic analysis different common patterns are being identified from the collected data and then the themes are being developed(Terry, et. al. 2017). The major reason behind selecting this data analysis method is that it helps in better interpretation of the data and make it easier for others to understand the results of the data.

Ethical Considerations

When the research is being conducted then it is important for the researcher to focus on different ethical considerations for conducting a high-quality research study. In the current research study, the researcher would focus on different ethical considerations such as plagiarism, respect of all the research participants, taking consent from the research participants and protection of the privacy of the participants.

Risk analysis

When the research is being conducted then there are different factors that can create risk in the research study.In the primary research the research participants might face the physical risk related to physical conditions such as pain, injury, illness, disease, or discomfort. Along with this other risk factors for the current study included loss of confidentiality, risk of protecting the data in an appropriate manner, legal risks, social risks, economic risks, and psychological risks.

Timeline/ Gantt Chart

ACTIVITY

WEEK 1

WEEK 2

WEEK 3

WEEK 4

WEEK 5

WEEK 6

WEEK 7

WEAEK 8

Finalising the

research aim and

objectives

Writing Research

proposal

Reading Various

Literature

Documenting the

Literature review

Conducting primary research

Writing Research

Methodology

Analysing the data

Documenting the

final report

Submission

References

  1. Bada, M. and Nurse, J.R., 2020. The social and psychological impact of cyberattacks. In Emerging Cyber Threats and Cognitive Vulnerabilities(pp. 73-92). Academic Press.
  2. Kamiya, S., Kang, J.K., Kim, J., Milidonis, A. and Stulz, R.M., 2021. Risk management, firm reputation, and the impact of successful cyberattacks on target firms. Journal of Financial Economics139(3), pp.719-749.
  3. Nayak, J.K. and Singh, P., 2021. Fundamentals of Research Methodology Problems and Prospects. SSDN Publishers & Distributors.
  4. Ørngreen, R. and Levinsen, K., 2017. Workshops as a Research Methodology. Electronic Journal of E-learning15(1), pp.70-81.
  5. Poushter, J. and Huang, C., 2019. Climate change still seen as the top global threat, but cyberattacks a rising concern. Pew Research Center10, pp.1-37.
  6. Sun, N., Wei, L., Shi, S., Jiao, D., Song, R., Ma, L., Wang, H., Wang, C., Wang, Z., You, Y. and Liu, S., 2020. A qualitative study on the psychological experience of caregivers of COVID-19 patients. American journal of infection control48(6), pp.592-598.
  7. Tariq, N., 2018. Impact of cyberattacks on financial institutions. Journal of Internet Banking and Commerce23(2), pp.1-11.
  8. Terry, G., Hayfield, N., Clarke, V. and Braun, V., 2017. Thematic analysis. The Sage handbook of qualitative research in psychology, pp.17-37.
  9. Tweneboah-Kodua, S., Atsu, F. and Buchanan, W., 2018. Impact of cyberattacks on stock performance: a comparative study. Information & Computer Security.
Recently Download Samples by Customers
Our Exceptional Advantages
Complete your order here
54000+ Project Delivered
Get best price for your work

Ph.D. Writers For Best Assistance

Plagiarism Free

No AI Generated Content

offer valid for limited time only*