HI6008 Business Research Project

Introduction

The challenges faced by business organisations are considered for the topic in the implementation of cyber security. The majority of the businesses organisations which are of significant interest in the topic in the available scenario are currently using information technology in the business environment for various operations. The cost efficiency is being achieved by the business organisations as a benefit of the use of information technology but it also shows a series of negative impact on the business environment. Cyber security is one of the impacts on negative terms for the use of information technology in business operations. Cyber security’s negative and positive impact on business organisations is required to be analysed for better operations. The business organisations face various types of major challenges concerning cyber security. The data loss, unauthorised access for the information, and many more challenges are present for the business organisation concerning cyber security. The data and information can be hacked and theft from the system of the organisation by professional hackers which is a great concern for the cyber security purpose of the organisation. Cyber security is the main challenge for business organisations to secure data security and information for users to use the business functions. The security for the data and information regarding various aspects of the business organisations is an important challenge for the business organisation when concerning the cyber security of the operations in the business organisations.

The main purpose of this report is to understand the research methodology which is best approach for identification of the various methods which is being concluded in the report and is being used in the report. The research report is being developed for finding out the best options from the research methodology which can be used in the analysis and identification of the best suitable tool for research in a proper manner. The primary and secondary data collection methods are used with various sources for the preparation of the research report. The cyber security has various challenges for the business organisation along with the need for information technology usage in modern business affairs.

Research Methodology

The research methodology is the process and technique which can help in analyzing, identifying, selecting and examining the important information or data about the topic of research. In this section, research methodology enables the readers to determine and evaluate the study validity and reliability in a better manner. This study has been conducted for analyzing the challenges of implementing cyber security in an organization (Ali, et. al., 2017). It involves data used to evaluate by using primary and secondary data, in which this is presented sampling method and use the approaches to the same. A researcher has developed the research question which will assist in understanding the impact of cyber security technology which creates major issues for the business.

Qualitative and Quantitative method

Qualitative method

In this, the qualitative method involves data which has included words and how they are developed the impact on other people’s lives. This will assist researchers in providing the data in a more relevant form than the other; it is an effective way to determine the information by performing the study. This is a primary exploratory research method that can be used to attain and understanding the reason, opinions, views and thoughts of the researcher correctly about the topic (Arabo, 2015). Along with this, it provides insights into the main issues and helps in developing appropriate ideas for desired quantitative research. The qualitative method is that process which desires an in-depth understanding of the social phenomenon in the settings.

This is mainly concentrated on the direct experiences of the human being as developing agents in their daily life. It is such a method of data collection which help in obtaining and attaining required data with the use of open-ended communication. The qualitative tool of research is prepared and designed in such a manner which can assist in revealing the attitude and behavior of the target audiences concerning the topic. Different forms of sources help gather and collect information that includes focus groups, ethnographic research, case study, a content analysis that are used in this method.

Quantitative method

The quantitative method has an inclusion of number which evaluates how much individuals analyze the impact of technology and businesses face challenges while they are implementing cyber security in an organization for smooth functioning. The questions have supported us in gaining the data that are related to the technological impact and the targeted audiences which have offered the answers which play an important role in the research project. Also, it is used to recognize the problems and issues by generating numerical and statistical data. It can be used for analyzing the opinion, ideas, views and thoughts and different benefits gained by this (Cirnu, et. al., 2018). This will help in generating accurate results and outcomes from existing customers by using sampling technique and there are various sources which can be used to collect accurate data such as questionnaire, survey, observations, interviews and so more. This research method relies on evaluating and determining the variables which are used in the numerical system and also examine such measurements by using the variety of statistical models.

In this, research can be selecting the qualitative method that can be used for providing descriptive data which are important for formulating the specific report.

Primary and Secondary data

Primary data

This is that method which can assist in gathering and collecting data by the researcher for investigating the report. Primary data is such data and information which should be gathered by a company as there is n published data. This is considered as the original form of data and it is directly related to study issues and problem. In addition to this, it is such techniques which can help use different sources that involve interviews, surveys, questionnaire and many more (Corallo, et. al., 2020). The primary data refer as accurate and original data to the topic so that they can easily examine and analyze the degree of relevancy. In this, it can be determined as the reliability of primary data which is high level as this will assist in collecting and assembling required data for completing the report.

Secondary data

It is that data collection method which is used for collecting and gathering required information by an individual and this is not associated with research but these are collected data in previous yearbooks, journal, magazines and case study. It is that form of data which is available in written, electronic and typed form. The secondary data collection method is used to attain the initial insight into the investigation problem. Along with this, various sources assist in collecting relevant and accurate data such as books, articles, magazines, newspaper and so more. This method is simple and easy as it is quick to access by the researcher (Fotouhi, et. al., 2019). This will also helpful in giving the way to access the work of the best author in all around the world. Secondary data provides an effective framework which helps in the lead towards the right direction to finishing the project.

In this, the researcher can use both secondary and primary data as this will help in gathering and collecting correct data for developing accurate project.

Sample size

It is that term which can be used in conducting market research to define the number of subjects and included sample appropriately. Through the sample, the researcher can easily evaluate the subject of groups that have been chosen from common people and it is mainly considered as representative of the true population for a specific study. Along with this, the sample size has been selected for this research which is 30 respondents who are willingly participated in this research process. The chosen respondents are based on different methodologies that can be adopted to observe the sampling and categorize the data that has completed (Kimani, et. al., 2019). It mainly evaluates the internal process of investigation and results that are based on collecting the various procedures and involved in the existing process. In addition to this, it will help in developing accurate changes to determine the outcomes in a better manner. The sample has been gathered among the huge population and selects 30 respondents who are given their opinions and views regarding the challenges of cyber security. Through this, they can easily answer the relevant questions according to their experience and knowledge properly.

Sampling approach

It is that approach which enables a researcher to conclude entire data and information regarding the population and this is based on gaining relevant results from examining a large number of population. Such sampling approach is that procedure which helps in recognizing and identifying the requirement of relevant sample and this can be used for providing accurate outcomes from the designed survey. In addition to this, it is essential for the researcher is to deliver the best results and gain relevant outcomes of this research (Lin, et. al., 2016). Besides this, the usage of various sample theories and models can be observed by designing and developing the entire research process that is associated with a different stage that is mainly included in this process. This includes testing of hypotheses, numerical data, interference and statistical estimation of information which are used in this research. Along with this, research is usually based on the pilot survey and associated values that are used for delivering and attaining accurate outcomes or results in a proper manner.

Data collection method

The data collection method is the process in which the data and research requirements are developed and formulated in a better and appropriate manner. It helps in examining and analysing the information which is used in the research. There are two kinds of data collection method tools which are primary and secondary data collection methods. The interviews, focus group, case study and many more sources are present for the data collection in a proper manner (Nayyar, et. al., 2019).

This is a process which can be helpful in the collection, processing, and gathering, analysing and measuring of the accurate outcomes of the research with the help of tools and techniques in an effective manner. The data and information collected are used by the researcher for the evaluation and measurement of the hypothesis. Data collection is the process which is used for the gathering and collection of the information which can be varied in interests (Tisdale, 2015). This is a process which can answer the research questions for the accurate evaluated results and hypothesis testing. The data collection methods are very important in the research report as the data and information are an important factor in the research.

Questionnaire design factors

A questionnaire is such a research method which is consistent with various series of questions. Its main motive is to collect the relevant response of respondents and understand their views. The questionnaire is designed for statistical analysis of the response and feedback that is not always associated with the case. Different factors that are considered at the time of designing a questionnaire that includes an accurate method of collecting data, order the questions, choosing the target audience, develop simple questions, such questions should have a direct relationship with the research topic, multiple-choice questions, must have clear objectives and many more (Patrick, et. al., 2017). These factors require to be considered by the investigator at the time of developing and designing the questionnaire to gather certain data that are relevant to the research subject.

Sample Questions:

Q.1. Which of the following age group do you belong?

·         Below 18

·         18-23 age

·         25-35 age

·         Above 35

Q.2. Are you aware of cyber security technology?

·         Yes

·         No

Q.3. Do you think, technology could negatively impact on the business operations and its functions?

·         Agree

·         Disagree

Q.4. What are the challenges of cyber security technology in business?

·         Technical skill gap

·         Cloud security problems

·         Fileless Malware.

Q.5. Do you agree that cyber security helps in reducing issues of theft of data, hacking of customers’ details, etc within an organization?

·         Strongly agree

·         Agree

·         Disagree

·         Strongly disagree

 

Analysis and Interpretation

The analysis of the questionnaire requires the preparation for the data and information collections which will be helpful from the population group members in the sample grid. The groups will provide their opinions and reviews about the research topic and answer questions. The questions which are related to the research topic and have an effective understanding of the topic will be developed by the researchers. The questions are asked from the respondents by the investigator for interpreting the data (Pereira, et. al., 2017). The researcher analyses the answers for interpretation by further study and then examining the various responses received from the respondents according to the research topic.

The best suitable answer will be decided based on the question category and calculating the proportions of participants in the process. The researchers face issues while collecting the feedback and response from the respondents in the analysis of the questionnaire. The analysis of the questions and examination is used for the various sources such as social media, emails, and face to face communications in the view of respondents. This is important in the completion of the research topic for analysis and investigation of the questions asked from the variety of people concerning the questions for the data and information collection.

Summary/Findings

It has been analysed that the identification of the best appropriate tool which can be helpful in the completion of the report in a suitable manner is the research methodology. The data collection method, sampling approach, questionnaire design factors, primary and secondary data and sample size are being described in the report which is research methods. The proper development of the research is being done by using these methods in the examination (Shapsough, et. al., 2015). The questionnaire factors can be found out using these methods for the designing of questions. The questions should be precise, easy, multiple-choice which can be responded easily be participants. The data and information can be examined which are necessary for the report preparation. The analysis and interpretation of the questions are necessary which will help in finding out the opinions and perceptions of the respondent participant about the research topic or subject in a proper manner for the completion of the research report.

Conclusion

The report is based on analyzing the challenges that are facing the implementation of information technology in business. Cyber security is considered as the process of safeguarding the information and improving the sessions, tools and types of equipment from a different type of cyber security system. An organization having good cyber security states that it kept their strategies and policies are based on the concept where business appoints trained employees who can handle the technology. Cyber security is the major task for any company to save their sensitive information and data correctly. The research methodology is the best approach for identification of the various methods which is being concluded in the report and is being used in the report. The research report is being developed for finding out the best options from the research methodology which can be used in the analysis and identification of the best suitable tool for research in a proper manner. The primary and secondary data collection methods are used with various sources for the preparation of the research report. The cyber security has various challenges for the business organisation along with the need for information technology usage in modern business affairs.

 

References

Ali, W., Dustgeer, G., Awais, M. and Shah, M.A., 2017, September. IoT based smart home: Security challenges, security requirements and solutions. In 2017 23rd International Conference on Automation and Computing (ICAC) (pp. 1-6). IEEE. https://ieeexplore.ieee.org/abstract/document/8082057/

Arabo, A., 2015. Cyber security challenges within the connected home ecosystem futures. Procedia Computer Science61, pp.227-232.

Cirnu, C.E., Rotună, C.I., Vevera, A.V. and Boncea, R., 2018. Measures to mitigate cybersecurity risks and vulnerabilities in service-oriented architecture. Studies in Informatics and Control27(3), pp.359-368.

Corallo, A., Lazoi, M. and Lezzi, M., 2020. Cybersecurity in the context of industry 4.0: A structured classification of critical assets and business impacts. Computers in Industry114, p.103165. https://www.sciencedirect.com/science/article/pii/S0166361519304427

Fotouhi, A., Qiang, H., Ding, M., Hassan, M., Giordano, L.G., Garcia-Rodriguez, A. and Yuan, J., 2019. Survey on UAV cellular communications: Practical aspects, standardization advancements, regulation, and security challenges. IEEE Communications Surveys & Tutorials21(4), pp.3417-3442. https://ieeexplore.ieee.org/abstract/document/8675384

Kimani, K., Oduol, V. and Langat, K., 2019. Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection25, pp.36-49.

Lin, H. and Bergmann, N.W., 2016. IoT privacy and security challenges for smart home environments. Information7(3), p.44. https://www.mdpi.com/2078-2489/7/3/44

Nayyar, A., Jain, R., Mahapatra, B. and Singh, A., 2019. Cyber security challenges for smart cities. In Driving the Development, Management, and Sustainability of Cognitive Cities (pp. 27-54). IGI Global.

Patrick, H. and Fields, Z., 2017. A need for cyber security creativity. In Collective Creativity for Responsible and Sustainable Business Practice (pp. 42-61). IGI Global. https://www.igi-global.com/chapter/a-need-for-cyber-security-creativity/171871

Pereira, T., Barreto, L. and Amaral, A., 2017. Network and information security challenges within Industry 4.0 paradigm. Procedia manufacturing13, pp.1253-1260.

Shapsough, S., Qatan, F., Aburukba, R., Aloul, F. and Al Ali, A.R., 2015, October. Smart grid cyber security: Challenges and solutions. In 2015 International conference on smart grid and clean energy technologies (ICSGCE) (pp. 170-175). IEEE.

Tisdale, S.M., 2015. Cybersecurity: Challenges from a Systems, Complexity, Knowledge Management and Business Intelligence Perspective. Issues in Information Systems16(3).

error: