1.0 Effectiveness and usefulness of learning experience
Opinion on learning experience
Learning experience represents the interaction between any course, or program, and the students from where they can learn something. It may happen in traditional learning settings, i.e. in schools or colleges, or it may take place in nontraditional settings such as in excursions in outdoor locations, or through nontraditional interactions such as through games, or software. It mainly refers to the acquisition of knowledge through any type of interaction (Glantz et al. 2014). I have made my research proposal on the issue of cyber security. It is a very important issue in the modern world when the world has become so heavily dependent on the internet for everything in life. While doing the research for the proposal, I have felt that the importance of learning experience. I have learnt many aspects of the cyber security, which I could not have learnt otherwise. Hence, writing the research proposal on cyber security has been an enriching experience for me.
Value of the learning experience
The value of learning experience can be represented in terms of learner’s satisfaction regarding the knowledge gained (Wang and Lu 2013). The learning experience from the research proposal has helped me to find out a purposeful direction of my study. I have learnt how to utilize the limited time and resources efficiently, how to make connections between the learning objectives and the activities to fulfill that, to lessen the gap between understandings, and understanding the real life simulations according to the study. Thus, this proposal has been a valuable learning experience for me.
2.0 Transfer of knowledge and insights in future
The research proposal will be helpful for me to gain in depth knowledge about the cyber world and the threats in that. In modern business, almost every important detail is maintained in computers and internet is used widely. Computerization and internet have made the work of maintaining records very easy, but at the same time, the internet has brought about many security threats in terms of stealing of important and secured information or destroying data within the system (Von Solms and Van Niekerk 2013). During the study on cyber business, I have learnt many such things.
The learning outcome from this proposal will be helpful in future if I participate in conferences and seminars at the end of my course. I would be able to present my knowledge and insights to more students, which could be useful for their further research and to business people and help them to improve their company’s cyber security.
The fulfillment of the above objectives can help me in the progress of my future career. I have planned to take up research and teaching as my future career goal. Hence, upon completion of my research, I would be able to contribute more in this field by sharing my gained knowledge about cyber threats. I hope to write in the digital and print media on related topics. I also hope to inspire my junior students to find out the areas, which I did not address in my research, and do further study on those.
During the research for this paper, I have learnt the various security threats in the cyber world. I, like billions of people in the world, use the internet for almost every important thing, be it Facebooking, booking tickets, online shopping or banking (Cavelty 2014). After learning about the threats, I have become more cautious about using the internet for sharing my personal details or do monetary transactions. If I could throw light on some new features for developing or improvement after my research, it would be helpful for all the people using internet.
3.0 Learning process
For learning and writing the literature review on this topic, I accessed the university and other libraries and read the previous works of other authors on cyber related topics. I also accessed several websites, online libraries, e-books, journals, magazines etc. (Palinkas et al. 2015). This has helped me to know about various factors affecting the security and threats of the cyber world. I have gone through many videos on how the security can be broken in the internet. I have also met the top management and managers of the IT departments of various companies to know what they think about this issue and how they plan to make the system more secure.
4.0 Usefulness of business research
For writing the research method, I learnt more about choosing and analyzing the data. I learnt how to collect primary data from interviewing people and conducting surveys and secondary data from databases of various governmental organizations and other authentic sources (Miles, Huberman and Saldana 2013). I learnt more about qualitative and quantitative data analysis methods; and how to use statistical tools and software. Thus, my knowledge about statistics has increased.
5.0 Explanation of learning process
The research proposal has helped me in learning about more about the cyber world and the threats it possess for the real world. In the first step, I learnt how to frame the research objectives and questions. Then I read many literatures for the literature review. After that, I focused on how to collect data and analyze those to find out the trend (Ragin 2014). I also learnt how to make timeline for research process. Therefore, through the research proposal, not only I learnt about various aspects of the cyber securities and threats, but it also helped me to learn more about the statistical aspect of any research paper.
6.0 Conclusion
The purpose of my research proposal is to address the issue of the threat of the cyber world. It is a very important issue in the modern world when more than half of the population uses internet and cloud computing for almost everything such as using social media, online bookings, online shopping, banking, and the governments of all the nations also use these facilities for storing confidential data. Hence, cyber security is very essential (Taylor, Bogdan and DeVault 2013). Through my research, I would like to suggest some improved measures to enhance the cyber security, so that the threats of hacking, data stealing and misusing of the data can be reduced.
References
Cavelty, M.D., 2014. Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and engineering ethics, 20(3), pp.701-715.
Glantz, C.S., Landine, G.P., Craig Jr, P.A. and Bass, R.B., 2014. Lessons Learned in Over a Decade of Technical Support for US Nuclear Cyber Security Programmes. In International Conference on Nuclear Security: Enhancing Global Efforts. Proceedings of the Interational Conference.
Miles, M.B., Huberman, A.M. and Saldana, J., 2013. Qualitative data analysis. Sage.
Palinkas, L.A., Horwitz, S.M., Green, C.A., Wisdom, J.P., Duan, N. and Hoagwood, K., 2015. Purposeful sampling for qualitative data collection and analysis in mixed method implementation research. Administration and Policy in Mental Health and Mental Health Services Research, 42(5), pp.533-544.
Ragin, C.C., 2014. The comparative method: Moving beyond qualitative and quantitative strategies. Univ of California Press.
Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A guidebook and resource. John Wiley & Sons.
Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security. Computers & Security, 38, pp.97-102.
Wang, W. and Lu, Z., 2013. Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), pp.1344-1371.