Nature of the Study The qualitative method will be appropriate for this study because it involves an understanding the motivation, reasons, and opinions of real-life situations. The qualitative method also provides insights into the problem from the perspective of the participant to develop ideas from significant events to explore contemporary issues to find answers to questions (Park & Park, 2016). More specifically, I determined that the qualitative method would be most appropriate for this study because I intended to explore strategies owners of small businesses use to protect their business data from cyber-attacks. Other methods that were reviewed are quantitative and mixed methods. Quantitative analyses are used for hypothesis testing …show more content…
The ethnographic design would not be suitable for this study because the goal of my research is not to understand the cultural practices of a specific group that wants to create, perceive, and navigates the social world. Furthermore, the phenomenological design would not be appropriate for this study since the goal of my research is not to explore lived experiences; researchers use phenomenological design to observe the meaning of lived experiences of a group people or an individual that relates to a unique phenomenon (Mayoh & Onwuegbuzie, 2015). I will not be using a narrative research design because its approach is on the story, typically both how and what is narrated. The multi-case design would be appropriate for this qualitative study because I would use multiple forms of data collection to systemically gather data from different small business owners on how they have strategically protected their business data from …show more content…
What successfully risk management strategies have you identify to evaluate cyber attack risks? 6. What is your contingency plan in the event of a cyber-attack? 7. What key strategies would you like to recommend to other SME owners that would help to prevent a cyber attack? 8. What other strategies, not covered in this interview, you would like share that might be beneficial to other SME owners? Conceptual Framework Vigilantism can be discussed as conceptual. I selected Cyber-Vigilantism as the conceptual framework for this study. Johnson (1996) offered the most detailed criminological definition of vigilantism as a social crusade that gives rise to planned acts of force or susceptible force by independent citizens. This concept is at the root of most vigilantism studies and continues to be valuable to this date. Vigilantism arises as individuals and or group response that breaks through norms. Also, vigilantes would often seek to offer social control, crime control, and a security guarantee for themselves and others they try to serve (Silva,
Marques Underwood INSS 391 Security and the Future With the transition of companies leaning towards advancing through the usage of big data, cybersecurity and the trends in technology are creating an increase in threats. The goal is to protect the databases and devices used at these companies before they are hacked and compromised for unwanted reasons. We’ll see the general concerns with security in the IT field, and steps that specific companies are taking to prevent and adopt to the landscape of the future in security. Devices are increasing at a rapid pace these days, meaning the more data is being expanding.
Research Scenario A: Question 1: Step 1 selection of test statistics Null hypothesis The null hypothesis is a statement that explains there is no difference between two variables (Salkind, 2013). Using the research question, a
Descriptive statistics is a conclusive research method used to
Therefore if the company protects its services, people, suppliers, community and customers or the stakeholders, they will feel safer. In the digital business arena, information security is imperative, the protection of everything that has an impact on the company’s digital footprint effects every part of the stakeholders operations. Spending money on security services or products is an investment into the stakeholder’s interest. Social contract plays a critical role in cybersecurity products and cybersecurity services in its core definitions.
Qualitative research design helped me identify my goals by consulting available research literature that is appropriate to my topic. The design decisions are explained and justified because my research question is based on prior research experiences. This design allows me to collect and analyze the data outcomes. 4. Is the design appropriate, given the research question?
These partnerships create an environment to share critical threat information, risk mitigation, and other vital information and resources” (DHS, n.d.). This is, in my opinion the best way to combat these vulnerabilities. It is essential that these private companies work with the DHS and allow them to conduct vulnerability assessments. Without the use of these assessments, then a company may not know where it stands. And with the growing threat of cyber-attacks, it is essential that our infrastructure be protected.
For each of the threats and vulnerabilities from the Identifying Threats and Vulnerabilities in an IT Infrastructure lab in this lab manual (list at least three and no more than five) that you have remediated, what must you assess as part of your overall COBIT P09 risk management approach for your IT infrastructure? Denial of service attack- close the ports and change the passwords. Loss of Production Data- Backup the data and restore the data from the most recent known safe point. Unauthorized access Workstation-
The quantitative research that I will critique, is about the effectiveness of proton pump inhibitors (PPI) in reducing the risk of gastric injury in elderly patients who undergo an aspirin regimen. According to the study, over 50% of elderly patients who had taken either a Non-steroidal anti-inflammatory drugs (NSAID), or aspirin for less than 30 days presented some type of gastro intestinal (GI) lesion (cite). This very high number causes concern, since aspirin and NSAID’s are commonly used medications to treat, and prevent a variety of conditions. The study aims to answer two questions, the first is the risk of ulcers linked to the acute or chronic use of aspirin, and/or NSAIDs. The second question is the efficacy of anti-acid secretory treatments on these ulcers (cite).
Organisations can better prepare for and respond to cyber assaults by following the framework's rules and best practises, lowering the risk of damage to their essential assets and reputation. The NIST incident response framework is a complete framework comprised of five phases: preparation, detection and analysis, containment, eradication, and recovery. Each phase is intended to cover specific tasks and activities that organisations must carry out when responding to crises. The framework emphasises the necessity of planning, which includes designing incident response policies, processes, and plans as well as performing employee training and awareness programmes.
Cut-off date 27 February. Part1: Essay. ‘Evaluate the contribution of a qualitative approach to research on friendship’. Part2: DE100 project report – Method.
Phenomenology designs researchers scrutinize phenomena in a natural setting to understand their occurrence in the research context; phenomenological researchers focus on participants’ experience (Hill, Carvell, Matthews, Weston, & Thelwell, 2017). Phenomenology study would not fit this research because researchers use the phenomenology study with strict respect of pre-conceived ideas about a phenomenon, and for the same reason bias in findings, interpretation appears problematic to uncover. Intellectual wield ethnographical design to illustrate proof of the overall helpfulness of a small sample size (Hill et al., 2017). Academics manipulate ethnographical study to indicate a specific and unique case about the total convenience of a small sample size. A single case study would not suit my endeavor for the inter-related concerns of procedural accuracy, researcher subjectivity, and outward validity (Jia et al., 2018).
Narrative research theory is the study of how human beings experience the world, and narrative researchers compile these stories via in-depth interviews and write narratives about the experience (Gudmundsdottir, 2001). The data collected in narrative research can be qualitative, quantitative, or both. In my research proposal I mentioned in the methodology section that my study will be mostly qualitative in nature but in some cases there will be some quantitative data. I also mentioned that my research will be investigating the Hammonds Farm area, with the intention of investigating the impact of relocations on the livelihoods of beneficiaries that were relocated from Ocean-Drive to Hammonds Farm. Since the study I will be doing involves a case study, the narrative research theory seems the most logical direction as it corresponds with the purpose of my study.
Social disorganization theory emerged from the early school of criminology and focused on the characteristics of neighborhoods which indicate a lack of collective efficacy that prevents deviancy and criminal behaviors. These aspects are summarized as poverty, high residential mobility, deteriorating physical conditions, homogeneity of residents and other social ills present. A neighborhood watch group collaborates with a neighborhood in order to organize themselves against aspects of social disorganization (Bennett et al, 2006), by improving neighborhood conditions, running patrols and reporting suspicious behavior to the police. The goal of this polices that, is to create collective efficacy which causes reductions in criminal behavior. The issue with neighborhood watch is that is characterized as a "black-box" where many aspects of multiple criminological theories have been incorporated making it difficult to determine which concepts are effective for reducing crime.
Critical Thinking Introduction Reputation and trust are key components in the cybersecurity world. If either of those are compromised and/or lost, then that company’s bottom line (and even perhaps longtime viability) would be negatively affected. Maintaining not just the appearance of honesty and integrity, but also actually being honest and acting with integrity are absolutely crucial to any successful cybersecurity firm. Acting in an unscrupulous manner or cutting corners, or being dishonest (even just a little) is a sure way to destroy a cybersecurity firm’s reputation. No matter how successful a cybersecurity company is, if doubts about its trustworthiness start to appear that can ultimately affect its future.
This example of vigilantes at work on the internet is able to be put in a very positive light, in contrast to the negative notions the thought of the word “vigilante”