Enjoy Upto 50% OFF on Assignment Solutions!
Ph.D. Writers For Best Assistance
Plagiarism Free
No AI Generated Content
INTRODUCTION
Background
Looking for Help With Assignments in the UK? Look no further than Native Assignment Help. Our team of experienced professionals is dedicated to providing top-notch assistance to students across the UK, ensuring they excel in their academic endeavours.
The business world is becoming technologically advanced day by day and the latest technologies are leading the world towards being highly developed. With the increasing use of technologies, the usage of data had increased to a greater extent for businesses. With better use of technologies and data, the risk for cyberattacks had also increased for the businesses to a greater extent(Kamiya, et. al. 2021).In the current business world, customer data and a lot of other data are important for businesses and if the company faces a cyber-attack then it would create a great loss to the company. In the research, the researcher would explore that what the organizations and individuals can learn from the history of cyberattacks on security and data. The researcher would conduct detailed research for expanding all the concepts related to the research topic.
As the number of cases related to the cyberattacks in the organizations is increasing rapidly and as a result of which the businesses are facing significant loss due to the cyber attack, it had become important that the businesses should know regarding the cyberattacks and learn from them due to which this research is being conducted. The motivation behind conducting this research is to provide better knowledge related to cyberattacks and cybersecurity which can prevent businesses from cyberattacks.
This study is important as it would provide better knowledge related to the cyberattacks which are being faced by businesses and individuals in history and this will help the organizations and individuals in focusing on the safety of the data from the cyberattacks. Along with this the research study would also provide better knowledge related to this research topic to other researchers also.
AIM AND OBJECTIVES
Aim
The present report aims at exploring that what organisations and individuals should learn from the history of cyberattacks on security and data.
Objectives
LITERATURE REVIEW
Cyberattacks had become common in the present era of technological advancement and digitalization. Poushter, and Huang, (2019) had mentioned that the cyber attack is an attack which is being initiated from a computer against any other computer or device which compromises the confidentiality of other computers. In other words it can be said that cyberattack is an assault or retreat operation engaged by the individual or by the organizations for stealing the information or the data which is being stored in a computer information system or the computer networks.
Tweneboah-Kodua, et. al.(2018) had mentioned that in recent decades the cyberattack on businesses had increased to a greater extent. When a cyberattack takes place in any of the company then the organization faced great loss and sometimes the company losses the confidential data of their customers, employees or any other stakeholder. In support of this Tariq, (2018) had mentioned that if the company losses the financial information of the company as a result of the cyberattack then it would have an significant negative impact on the organisation. According to Bada, and Nurse, (2020) if the businesses face any of the cyberattack then it would have an great negative impact on the overall performance of the company and would also create several issues for the organisation.
Researcher methodology is one of the important parts of the research which explain regarding the methods and the procedures used by the researcher for conducting the research in a systematic manner(Ørngreen, and Levinsen, 2017). There are different sub-sections of the researcher methodology which explains in detail regarding the research methodology which are mentioned below such as:
Research design is being defined as the overall strategy which is being used by the researcher for conducting the research study. Two different types of research designs are present which are qualitative and quantitative research design(Sun, et. al. 2020). The researcher needs to select an appropriate research design on the basis of the aims and objectives of the research study. In the current study, the researcher would focus onqualitative research design. In qualitative research, the researcher focuses on collecting high-quality and in-depth qualitative data for the research study.
The set of different methods used by the researcher while conducting the research study is being referred to as the research approach. Majorly the research approach is of two types inductive and deductive. When the researcher conducts the research study for the known premises then it is called deductive research approach and on the other hand when the research conducts a for unknown premises then it is known as an inductive research approach. In the present study, the researcher would focus on applying the inductive research approach for conducting the research study.
The research method is being defined as the process of collecting and analyzing the data for the research study. There are different types of research methods that can be used by the researcher for conducting the research study. In the present study the researcher would use the exploratory research method in which the research topic would be explored in detail for explaining all the different concepts related to it in detail(Nayak, and Singh, 2021).
Data collection is being referred as the method used by the researcher for collecting the data for the research study. In the current study the researcher will focus on using the primary data collection method. Primary data collection is being referred as the process of collecting the data by own. On the other hand, secondary data collection is being referred to as the process of collecting the data from the previous literature which is already published. In the current study, the researcher would conduct the interviews and questionnaire surveys for collecting the primary data for the research study.
Data Analysis
The process of analysing the data which is being collected in the research study is being referred as the data analysis. There are different methods which can be used by the researcher for analyzing the data but in the current study the researcher would focus on applying thematic analysis. In thematic analysis different common patterns are being identified from the collected data and then the themes are being developed(Terry, et. al. 2017). The major reason behind selecting this data analysis method is that it helps in better interpretation of the data and make it easier for others to understand the results of the data.
Ethical Considerations
When the research is being conducted then it is important for the researcher to focus on different ethical considerations for conducting a high-quality research study. In the current research study, the researcher would focus on different ethical considerations such as plagiarism, respect of all the research participants, taking consent from the research participants and protection of the privacy of the participants.
Risk analysis
When the research is being conducted then there are different factors that can create risk in the research study.In the primary research the research participants might face the physical risk related to physical conditions such as pain, injury, illness, disease, or discomfort. Along with this other risk factors for the current study included loss of confidentiality, risk of protecting the data in an appropriate manner, legal risks, social risks, economic risks, and psychological risks.
Timeline/ Gantt Chart
ACTIVITY |
WEEK 1 |
WEEK 2 |
WEEK 3 |
WEEK 4 |
WEEK 5 |
WEEK 6 |
WEEK 7 |
WEAEK 8 |
Finalising the research aim and objectives |
||||||||
Writing Research proposal |
||||||||
Reading Various Literature |
||||||||
Documenting the Literature review |
||||||||
Conducting primary research |
||||||||
Writing Research Methodology |
||||||||
Analysing the data |
||||||||
Documenting the final report |
||||||||
Submission |
References
Go Through the Best and FREE Samples Written by Our Academic Experts!
Native Assignment Help. (2024). Retrieved from:
https://www.nativeassignmenthelp.co.uk/research-proposal-assignment-sample1
Native Assignment Help, (2024),
https://www.nativeassignmenthelp.co.uk/research-proposal-assignment-sample1
Native Assignment Help (2024) [Online]. Retrieved from:
https://www.nativeassignmenthelp.co.uk/research-proposal-assignment-sample1
Native Assignment Help. (Native Assignment Help, 2024)
https://www.nativeassignmenthelp.co.uk/research-proposal-assignment-sample1
Financial Management for Global Decision Makers...View or download
Historical Hair and Makeup Studies Assignment Introduction {{TEXT1}} Second...View or download
Web Analytics Introduction - Web Analytics {{TEXT3}} Web analytics is...View or download
Environmental Analysis of Gucci Assignment Introduction {{TEXT2}} The global...View or download
Statistical Modeling and Time Series Analysis...View or download
Portfolio Assessment Assignment Sample Introduction Overview of the...View or download
Get your doubts & queries resolved anytime, anywhere.
Receive your order within the given deadline.
Get original assignments written from scratch.
Highly-qualified writers with unmatched writing skills.
We utilize cookies to customize your experience. By remaining on our website, you accept our use of cookies. View Detail
Hi! We're here to answer your questions! Send us message, and we'll reply via WhatsApp
Please enter a messagePleae enter your phone number and we'll contact you shortly via Whatsapp
We will contact with you as soon as possible on whatsapp.
Ph.D. Writers For Best Assistance
Plagiarism Free
No AI Generated Content
offer valid for limited time only*