How do you address the results which are related to the vulnerability for the higher to the lower risk transformation?
How the events are caused with the interruptions to the different business processes which are identified with the major impact on the potential of the interruptions?
Qualitative research: the concept of qualitative research is based on exploratory kind of research. It is again to understand all the basic reasons as well as views along with motivation behind it. It also gives an insight related to the issues in order to grow right kind of ideas for potential research (Choo et al., 2016).
Quantitative research: quantitative research is also utilized in order to solve the issues by way of developing so many kinds of numerical based data or the data that can be changed into used statistics. It is also utilized to quantify the behavior, views, and other elements and general outcome from a large sample.
In this case, so many quantitative sources will be included in the study to understand the issues. Consumers will also be contacted for collecting the qualitative data to understand people perspective. This further will be executed to make sure that the opinions of people in cyber crime were covered completely in all aspect (Kshetri, 2015). Moreover, there are many small companies as well which are getting impacted for the same issue who will be interviewed to understand the reaction and opinions related to serious problem.
The study will have a simple as well as random sampling method that will be utilized to conduct interview which is based on respondents as well as they also answer the research based questions as well as test the hypothesis. Also a pilot study will be carried just before conducting the main research to decide the impact of data collection and related tools just before the main survey (Donaldson et al., 2015).
The elements or variable in the present research can be based on many dependent as well as independent points. The dependent on one hand will be based on age, gender of the respondents. Independent variable will include the basic attitude of the business whether people can utilize the basic standard of such issues or level of impact of cyber crime on business and many more (Klavans, 2015).
After finalizing the sample for the study, different forms of informed permission will be provided to the participant through electronic medium or by physical delivery. The main motive of the study will also be explained to the participants. It is important to keep the information provided by them confidential and only based on the opinion of other clients to make a common conclusion (Šendelj et al., 2014).
The outcome achieved from the survey will be recorded at one place on an excel sheet. Then it will be edited properly and the data will then be properly exported into a version related to data analysis system. Data presented will also use the descriptive status like means as well as mode based percentage method. The overall summaries will be presented in visual manner (Šendelj et al., 2014).
Following are some of the outcomes:
1. Value constantly migrates on internet and digital data is more pervasive by nature. The results prove that the big companies or organizations create so many kind of incentive for cyber crime and associated criminals.
2. Corporation is also expected to be more frank than before. People working in company are asking for an access to networks in company through similar devices that they use for personal use (Thuraisingham et al., 2016).
3. The concept of supply chain are become connected with people and organizations. In order to bring more strength to customers and also been able to optimize the present supply chain, organizations are motivating many vendors and consumers are also joining the present network.
4. The factors which were malevolent before are now becoming more sophisticated by nature. There are so many professional criminal in this field which are based on groups and are becoming more advanced with passing time. in fact in certain cases, the concept of outpacing of the present skills as well as resources of corporate based security teams are connected with it (Thuraisingham et al., 2016).
Reliability And Validity
There will be the usage of mixed techniques in this research which is related with number of threats to the validity as well as reliability of outcome achieved. In case of primary research, a test on the concept will be perfumed to understand whether the same outcome can be reproduced or not (Johnson, 2015).
Some of the limitations of the methodology used in this research will be long time restrictions and overall efforts are required for the same. In addition, the research all needs more resources to collect a lot of information to reply the research questions. There are many sources of data that can also be used to become more confident with the finding of the research and most importantly some data obtained might not be very collaborative by nature (Johnson, 2015). This is why; there can be a case of discrepancy in outcomes.
Choo, K.K.R., Abawajy, J. and Islam, R., 2016. Special issue on cybersecurity in the critical infrastructure: Advances and future directions.
Donaldson, S.E., Siegel, S.G., Williams, C.K. and Aslam, A., 2015. Measuring a Cybersecurity Program. In Enterprise Cybersecurity (pp. 213-229). Apress.
Johnson, T.A. ed., 2015. Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare. CRC Press.
Kaplan, J.M., Bailey, T., O'Halloran, D., Marcus, A. and Rezek, C., 2015. Beyond Cybersecurity: Protecting Your Digital Business. John Wiley & Sons.
Klavans, J.L., 2015. Cybersecurity-What's Language got to do with it?.
Kshetri, N., 2015. Recent US Cybersecurity Policy Initiatives: Challenges and Implications. Computer, 48(7), pp.64-69.
Norris, D., Joshi, A. and Finin, T., 2015, June. Cybersecurity challenges to american state and local governments. In 15th European Conference on eGovernment (pp. 196-202). Academic Conferences and Publishing Int. Ltd..
Nunes Tartari, E., Ricca, F. and Taylor, A., 2016. Challenges in Cybersecurity: a comparative analysis of disparate US and Russian positions in the international arena (Doctoral dissertation).
Šendelj, R., Lombardi, F., Ognjanovi?, I. and Guarino, S., 2014. Cyber Security in Montenegro: Practice, Framework and Challenges.
Thuraisingham, B., Kantarcioglu, M., Hamlen, K., Khan, L., Finin, T., Joshi, A., Oates, T. and Bertino, E., 2016, July. A Data Driven Approach for the Science of Cyber Security: Challenges and Directions. In Information Reuse and Integration (IRI), 2016 IEEE 17th International Conference on (pp. 1-10). IEEE.
Van den Berg, J., van Zoggel, J., Snels, M., van Leeuwen, M., Boeke, S., van de Koppen, L., van der Lubbe, J., van den Berg, B. and de Bos, T., 2014. On (the Emergence of) Cyber Security Science and its Challenges for Cyber Security Education. In Proceedings of the NATO IST-122 Cyber Security Science and Engineering Symposium (pp. 13-14).