Tuesday, May 5, 2020

Challenges for Cyber Security in Business for Online Articles

Question: Write about tehChallenges for Cyber Security in Business for Online Articles. Answer: Reflective Journal The research process was completed in duration of 12 weeks. The first week was the initiation week that included the selection of the research topic as Challenges for Cyber Security in Business and a feasibility studied was also carried out. The research was feasible and the results were documented. The second week of the research process included the planning of research scope and research questions. The research methodologies as qualitative and quantitative methods of research were found to be apt for the chosen topic. A research plan was completed in the second week (Polyu, 2002). A literature review was carried out in the third week. There were case studies of three different companies that were studied and analyzed to understand the cyber-attacks and issues that were prevailing. There were also other research journals and articles that were studied and referenced. In Week 4 and 5, a research proposal was prepared which included the gaps that were identified, research methodologies along with the limitations and timeline. Week 6 included the sampling process that was required for research execution. There were small and large sample sizes that were identified for the research execution (Watkins, 2007). The next two week, that is, week 7 and week 8 included that identification of the data sources such as organizational documents, online articles, libraries and likewise to gain more and more information on the challenges that were associated with cyber-security in business. Data analysis was carried out in Week 9 and 10. The data that was collected was analyzed to understand the patterns and the trends that were associated. The results were then compiled and documented (Niu, 2014). The last two weeks were kept reserved for the review and presentation part. The research work that was done was reviewed by the guides, mentors and specialists and the feedback was incorporated. The final research paper was then presented as the last step in the research work. Learning Experience The learning experience during the research process provided an in-depth knowledge on the research topic as Challenges for Cyber-security in Business. There are occurrences and security events that are talked about but are not paid much attention unless the issues as personally analyzed and understood. The learning experience allowed the ability to acquire the skills on the research methodologies and processes along with the details of the challenges and issues associated with cyber-security (Dcu, 2017). The learning experience has an immense value as it has allowed the enhancement of the research and technical skills and abilities and has also provided the capabilities to deal with the risks that may come up during a project timeline. Usefulness of the Learning Process The learning experience will serve positively in the course and program as it will provide the necessary professional growth and development. It will be useful in the future career and personal life as well. It is because of the reason that the research topic that is selected has a lot many employment opportunities in the current times. There are varied roles and profiles that the employers have generated in the area of cyber-security. The research work will allow the opportunity to apply in such roles and will also aid in the measures that must be adapted to avoid and prevent the security risks (Uts, 2017). Activities that Occurred in the Learning Process The research process that was carried out was done in a series of activities and phases. There were initiation, planning, execution, analysis and presentation phases that were involved that included a set of activities and sub-activities. There were challenges and issues that were observed in the field of cyber-security in various industries and the impacts that they have on the business and the end-user were understood. There are many cyber-attacks that take place because of the negligence of the end-user that were also noted and analyzed (Iwaoka, 2007). Evaluation of the Learning Process The business research that was carried out had a direct relation with the research learning process. It allowed the deeper understanding of the selected topic along with the activities that are carried out during a research project. The two set of activities were required to be brought together on a single platform which was done successfully due to the research methodology that was adopted (Otago, 2017). Reason for Research Activities There were many research activities that were carried out during the research process. The research plan was prepared to identify the research scope, research questions and the research methodology that was to be applied. There was a literature review that was prepared as a first step in the research execution. It was done with a view to understand and observe the work that was done in the selected research area. There were numerous important points that were acquired during the literature review that helped in the conduction and completion of the research (Gambhir, 2010). There was a research proposal that was also prepared that covered the gaps that were identified in the literature review along with the research methodologies, limitations and timeline. The research proposal included some extremely relevant information regarding the research process and was one of the most significant deliverables as well. Sampling and data analysis were also the activities that were done as per the research methodologies that were selected. These activities assisted in the determination of the research results and conclusions. Application of Learning in Future The learning will be extremely useful and applicable in future. The business research that was carried out provided knowledge and information on the issues that are prevailing in the area of cyber-security. It provided with the steps and measures that shall be applied to keep the information and devices secure. Also, the future trends that are probable in the field were also determined. The research process and learning experience will be useful in the professional development and growth. It will be of extreme significance in the career prospects as well. The future research works that will be carried out will also show better results with this learning experience. References Dcu (2017). Reflective Journals. [online] Available at: https://www.dcu.ie/sites/default/files/ovpli/Reflective%20Journals.pdf [Accessed 31 Aug. 2017]. Gambhir, V. (2010). What is a Reflective Journal?. [online] Available at: https://startalk.umd.edu/2010/materials/Teachers/AssessmentTools/Urdu/ReflectiveJournal.pdf [Accessed 31 Aug. 2017]. Iwaoka, W. (2007). A guide for writing a reflective journal . [online] Available at: https://misclab.umeoce.maine.edu/boss/classes/SMS_491_2007/journal.pdf [Accessed 31 Aug. 2017]. Niu (2014). Reflective Journals and Learning Logs. [online] Available at: https://www.niu.edu/facdev/_pdf/guide/assessment/reflective_journals%20and_learning_logs.pdf [Accessed 31 Aug. 2017]. Otago (2017). Writing a Reflective Journal. [online] Available at: https://www.otago.ac.nz/hedc/otago615373.pdf [Accessed 31 Aug. 2017]. Polyu (2002). Reflective Learning Journal. [online] Available at: https://www.polyu.edu.hk/obe/students/files/reflectivewriting.pdf [Accessed 31 Aug. 2017]. Uts (2017). Reflective Journal. [online] Available at: https://www.uts.edu.au/sites/default/files/reflective_journal.pdf [Accessed 31 Aug. 2017]. Watkins, L. (2007). Reflective Journals. [online] Available at: https://www.eduweb.vic.gov.au/edulibrary/public/teachlearn/student/reflectivejournals.pdf [Accessed 31 Aug. 2017].

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.