Professional Documents
Culture Documents
Name
Institution
RESEARCH PROPOSAL 2
Chapter 1: Introduction
Sandboxing is a very important task in important in improving the cyber security. Cyber
security refers to the protection of any internet run program from threats that include hacking,
viruses, and others. Most of the institutions are always at a threat of being attacked or hacked.
For example, financial institutions usually carry out their transactions via the internet. Their
cyber security could be at threat if they are not well secured. Therefore, they could lose a lot of
cash to the cyber criminals (North & Pascoe, 2016). This brings in the importance of having a
trusted source that will protect the programs being run to serve an institution. Sandboxing
becomes an important part of the cyber security system to the institution’s programs. The
sandboxing works by separating the institution's programs from untrusted and unverified sources
which are usually the third parties, suppliers, and other users’ websites that could harm the
operations of the host. In many cases, the sandboxing helps to protect the host machines from
being invaded by the viruses that come in from the activities of the third party (Porter, 2016). If
the machine of the host I affected, it becomes makes it too hard for operations especially when
The world that we are living in today is becoming very useful for a person to work using
a computer. The operation system of a computer is supposed to be out of infections so that it can
enhance and increase the work rate of the user (Jenab&Moslehpour, 2016). The computers have
a lot of programs that are used to run various departments of the firm. For example, the
accounting department of the firm is useful as it keeps the financial operations of the firm to
move on smoothly. The accountability and transparency of the firm’s financial stature are
important to the firm and the country at large. First, it ensures that every coin is spent on what it
RESEARCH PROPOSAL 3
was planned for at the beginning. Secondly, the firms usually pay taxes to the government. It is
only through a wellworked programthat will ensure that the firm calculates the correct amount
that would then be paid to the government. If the machine that contains the data in the finance
office is corrupted by the virus, this work would become difficult to perform. The virus would
cause a lot of delays leading to poor calculations and submission of incorrect figures.
In addition, computers that are programmed to perform different task do improve the
working rate of a firm (O'Flaherty, 2015). In this regard, the firm would hire a few people to
perform a task that would otherwise require a multitude of workers to work manually. Programs
are designed in a way that they make the performance quick by the click of a button. For
example, most of the financial institutions such as banks and insurance firms do use some
specific programs to calculate the interest that is accrued on a given amount of money that is
either loaned out or deposited by their customers. The programs used are vital in making the
work easier, ensuring that the employees do not make errors in their computations
The world today is highly depending on the technology as a means of production. In this
case, the production does not only mean the factory processing of raw materials to finished
products (Whitler& Farris, 2017). The service industries also depend highly on the development
of technology. For example, the communication sector of any country in the world is highly
depending on the development of mobile phones and the mobile networks. The procession
industries are also depending on the development of technology where machines are controlled
by the press of a computer button. Therefore, there is an increased need to have the efficiency in
the computer systems so that the production can continue without there being a huge challenge.
RESEARCH PROPOSAL 4
The computer software and the hardware system are a crucial part of the entire
development of resources with respect to technology (Spalevic, 2014). The scientific research
that leads to the development of applications to be used to run different parts of the machineryis
stored on the hard disk. Thissoftware requires being well kept and secured from some unsafe
programs that could lead to their destruction. Secondly, people do invest a lot of money, energy
and time in trying to come up with software that is to be used in various investments. These
them. However, if the computer system is not well secured, some uncouth individuals could hack
into the computer and steal the programs. The stolen programs could then be sold at a very cheap
cost to other firms leaving the person or company that developed the software empty handed.
This practice has been happening for most of the firms around the world. This is one of the areas
Secondly, the development of the technology has been incapacitated by the malware. The
malware is a form of software virus that is made for the purpose of blocking and damaging other
people’s computers. They first make the processing of the data slow and then disable the
programs (Bryant, 2016). Therefore, the scientist could be unable to implement the technology
that they were working for. This practice can be dangerous to the development of the technology
around the world. First, the intended technology would be unable to be passed to the next user. If
the user was intending to use it in the development of the production process, the production
would remain the same. In addition, if the technology was already in use for the production of
goods and services, the machine that was being run by the program would fail to lead to the
failure of the production. The effect of this failure can be felt by a lot of people including the
people that were depending on the product or the service for their livelihood. In addition, the
RESEARCH PROPOSAL 5
producing firm will fail to make the profit as required leading to a lot of losses. The losses made
could be dangerous to the firm, the employees and the country at large. Therefore, there is a great
need to seek for a formula that would be used to ensure that the functioning of the computers is
The use of computer programs varies from one place to the other. The programs that are
designed for industrial use are different from the ones designed for the domestic or the ones used
at home (Dahbur et al., 2017). In most of the times, the people using the computers for different
tasks do not know about the viruses that can affect their system at any given time. Therefore, the
users fail to understand what has happened to their computers when they fail to function as
required. For example, the students taking different courses other than sciences could be using
the computers to work on their essays, do research work and other work (Kshetri, 2010). In
addition, people with small businesses could be using their computers to list the stock and sales
and compute on the cash flow. Other users who are common but non-specialists in the
information technology are the people who use the gadget to download and watch movies, listen
to music and play computer games. Research shows that this category forms the majority of the
computer program users, but have very little knowledge concerning the threats that harm their
devices now and then. This group of users requires that the computers they are using be
programmed by a specialized so that they cannot be harmed by the malware. The pre-
programmed computers are vital for the running of the daily business as a means of ensuring that
they pursue the social and economic development of the society. Therefore, the Information and
Technology scholars have encouraged firms to put proper programs that will ensure that the
computers produced are installed with the antivirus programs. These computers would, therefore,
The current study aims at establishing the use of sandboxing as a means of protecting the
computer devices from being affected by the malware. This study is crucial as it will determine
the need of sandboxing in relation to the safety of the data stored in the computer. Sometimes
professionals in this field do have different views on this issue. Therefore, the study will aim at
creating the boundary and installing the confidence to the computer users who will have an
answer on whether they should allow sandboxing as a means of protecting their data or they are
To investigate the dangers caused by Cyber Crimes in the business sector around
the world
To identify the needs and the limitations of sandboxing in relation to data and
What effect does the cybercrime caused to the businesses are research firms in the
world?
What are the known methods that can be used to intercept and remove harmful
programs that could interfere with the computerized programs used to run a
Introduction
Recent studies show that the majority of the firms around the world is engaged in the
safety measures that would protect their cyber system. However, in the developing world, most
of the cyber users are not aware of the programs that might affect their computer programs.
Therefore, they are often faced with complications when their computer programs are infected by
the viruses (Lukasik, 2011). This problem does not only happen to the information and
communication technologists in the developing world. There is also a group of victims in the
developed world. Therefore, there is a great need for the whole population to know about how
they can manage their computers from being manipulated by the practices of other malicious
cyber criminals.
Literatures that have been compiled by the Information and Technology scholars mostly
focus on the Cyber Crimes. Cybercrime is a broad topic that has attracted most of the authors to
provide an insight of what the corporates and the public should expect (Ayral&O'donnell, 2016).
This section examines and explains the various researches that have been undertaken by
researchers in line with this topic. The examination would then give way for the gap that have
Hewe and Alexander made a research on the threats and challenges of Cyber Crime and
the response that should be taken by the user (Hewe, 2016). The authors realized the fact that the
use of computer programs is vital for the running of the organization. The authors outlined
various risks that organizations suffer due to cyber-attack. Organizational accountability is one
of the major risks that any firm would suffer in case the computer programs are attacked by the
RESEARCH PROPOSAL 8
malware. The organizations are supposed to give an account for various activities including the
monetary budgeting. This is the most important part of any company’s activity as it offers the
cash flow to various sectors (Seong-kee& Tae-in, 2015). The government requires that all firms
present their cash flow activities to the public if they are publicly owned. In addition, the
accounting department usually budgets for every coin in a given financial year. However, if the
computer program that runs these activities is affected, then the accountability of the firm and the
budgetary programs would be lost. Industrial management is another risk that is considered in
this research (Perez, 2016). According to Hewe (2016), industries depend highly on the computer
programs in their management. Industrial management discussed by the authorsincludes the use
of computer management to set out the different production processes where the industries are
capital intensive. In the modern industries, the firm managers usually usecomputerized robots
that operate under the command of computer programs. If these programs are interfered with by
the malware, they would make the production process very difficult to manage. In addition, the
authors described the importance of the computer programs in aligning the group decision
making with regards to executive reports (Harrop& Matteson, 2013). The authors gave an
services. The stages of innovation requirebeing stored and be discussed by various groups that
make the final decision. Finally, the two authors discussed the needs to protect the computer
users against the cybercrimes for the general enhancement of the production of goods and
services.
Putte and Verhelst also conducted a research on the Cyber Crime. Their research question
was in the relation to the cyber Crime challenged the continuity of businesses (Putte&Verhelst,
RESEARCH PROPOSAL 9
2013). The two authors intended to know the reason why business managers get challenged by
the cyber threats that make them even fail to get over after a cyber-crime. The infection of the
computer programs by viruses causes a lot of dysfunction of the business processes. Therefore,
the authors provide the Risk management in business with regard to the operations that are made
possible by the use of computerized programs. One of the risks that can bring business
operations to a halt is the realization that the computer facilities that are used to run some
programs are infected by viruses. The authors acknowledged the fact that the process required to
mitigate cybercrimes are becoming harder due to the sophistication of the challenges. Therefore,
it calls for the software development managers to invest highly on the methods that should be
used to bring these threats to an end. However, there are no major solutions that have been
forwarded that can completely help to wind out these challenges. As the software developers find
a solution to one of the problem, the problem develops to another level. Since the managers and
the software developers are supposed to research on the program, they invest a lot of their time
and effort trying to create a sandbox that will help to solve the problem. While doing this, the
business being operated using thissoftware can be highly affected leading to a lot of losses. If the
managers were light-hearted, they end up being affected and sometimes move away from the
sector. This could be discouraging to the aspiring managers and investors who learn that their
businesses and investments can be harmed by and be reduced to losses. Therefore, the author’s
calls for the software developers to ensure that they come up with the programs that would
ensure that the computers used for various functions are free from viruses and dangers.
Matijasevic and Jelena(2014) are another set of authors who composed a research
concerning the procedures that can be used to bring to an end on the Cyber Crime. The authors
RESEARCH PROPOSAL 10
acknowledged that Cyber Crime is a global problem just like the terrorist activities. The
repercussions of the cybercrime affect the whole world. Therefore, the authors call for the global
response towards the menace. According to the authors, different countries have different
technological capabilities. The developed nations are in a better position to identify the
individuals that are associated with the cybercrimes. They are the source of the technologies that
are used globally. On the other hand, the developing countries are the consumers of the computer
products that are produced by the industrial nations. Although the developing world is the
leading consumer, the liberal market integrations have enabled the developed nation to seek to
expand their activities to the growing nations. Therefore, the threat caused by the cybercrimes
affect all the stakeholders. This form of integration constitutes a suitable platform for the
software developers to find the source of the cybercrimes. Finding the source of crime would be
better than applying sandboxing to every program in the computers. In addition, the authors
suggest that the international players come up with the criminal Act that would be used to tame
the cyber criminals. The cybercrime Act will be made and be integrated to the international law.
In this regards, the criminals would be punished equally regardless of their nationalities. The
European Union has been in the forefront in establishing such an Act. All the countries within
the union have harmonized their Cyber Criminal law into the agreed proposal. The law is
projected to establish a secure standard that would be used to deal with the criminal activities.
Cyber terrorism
cybercrime has widely been used in the development of terrorist’s activities (Rollins, 2016). This
form of crime is being referred to as cyber terrorism. The terrorists do hack into
institutions’network where they steal the data that they use to plan and execute terrorist activities
RESEARCH PROPOSAL 11
around the world. The most affected are the government institutions, especially the military
system. These amounts to computer crimes as the programs are designed using the programmed
computers. According to Rollins, the terrorists usually steal the government’s data and secrets
concerning their missions. It is for these reasons that the terrorist is able to tell the plans that the
government has and they can counter it without a sweat as they already aware of the plan.
Therefore, the author recommends that the cyber security issues be streamed up to ensure that the
government secrets are withheld from the outside world. Rollins also argues that the United
States of America’s security system is largely influenced by the retail market industry in the
country. As the retail market invest highly on online marketing, the government gets into the
action as a watch list of the activities. In other words, the government does control the online
activities of the online retail shops for the purpose of ensuring transparency in taxes submissions.
The terrorists use this link to enter into the government’s cyber programs where they hack and
steal their data. Therefore, the author suggests that the government seal the gaps that are
allowing the terrorists to steal their data by investing highly in the cyber technology.
Warwick Ashford also composed a research concerning the rate at which the
governments and other institutions are responding to the cyber-criminal activities (Ashford,
2016). The criminal activities require being encountered as soon as they are noticed. This ensures
that the public is not highly affected by the criminals. In this regards, Ashford was investigating
the rate at which the Great Britain government was encountering this criminal activity. The
author used the National Crime Agency (NCA) data in the Great Britain to conduct his research
(Lin, 2016). The findings of the research were that there was a little response from the
government agencies in encountering the criminal activities. This research suggests that the rate
RESEARCH PROPOSAL 12
at which the cybercrimes were worldwide exceeding the rate at which individuals and
offenders are walking free due to the weaknesses in our Cyber Security system. This finding
could be dangerous to the development of our country and the world at large. First, consider that
the Great Britain has a huge capacity to deal with the cybersecurity issues compared to other
developing countries. Therefore, the country could be expected to have an immediate response
team that would be used to counter these crimes. This means in most of the developing world,
there is very little of no response to this risk.This could be the reasons why terrorist activities are
being witnessed in major cities of Europe. As the terrorists know that the cyber security breach
would not be noticed, they may be opting to hack on the government institutions where they find
about the security arrangements. Then, they criminals could be using the funding to corrupt the
government data making them unable to come into attention when the terrorist’s activities are
being planned and executed. The author recommends that the government increase the rate at
In addition, Cherif Sleiman conducted a research on the cost of combating the cybercrime
in Oman. Oman is one of the upcoming economic giants in the Middle East (Sleiman, 2017). The
use of the computer programs to send, receive and store data is on the rise. However, the
problem of cyber security that faces the entire world is also available in Oman. In this country,
the author states that the government in conjunction with the private entities is working hard to
take this menace. However, the rate at which the cybercrime is growing is saddening. The efforts
that are being made involve developing antivirus that can detect and automatically delete the
virus being used to interrupt the computer system. Sleiman acknowledges the fact that having
computers as a data storage venue is vital for the performance of businesses in the private and
RESEARCH PROPOSAL 13
the public sector. However, he acknowledges the fact that the businesses fall at risk of losing
their data through the manipulation of the malware. It is for this reasons that he calls for the
business enterprises to ensure that they take the necessary security measures that would ensure
the safety of their data. Therefore, he recommends that every business enterprise to have at least
one specialized information and technology employee who would be designing programs that are
resistance to the virus. The author says that the use of the programmed computers in the running
of daily business activities should not be halted due to the data infections by malicious programs.
The use of technology in the 21st century is vital in ensuring that the country and the world at
large create efficiency in the production process. Therefore, he recommends that firm tries to use
other programs that would ensure that the business data are safe at all the time.
Leslie et al., (2016)also put their effort in conducting their research in this field. The
research was used to determine the level of investment that firms make in ensuring the
prevention of cyber insecurity. In other words, the researchers were investigating the level of
capital that is used in developing software that can be used to take the cyber insecurity. The
authors state that it is a fact that cybercrimesare on the rise. But what are the causes of the
increase in cybercrimes? For the answers to these questions to be revealed, the authors made an
inquiry on the same to various companies. However, they found out that majority of the firms do
not invest their money on the cyber-related activities(Leslie et al., 2016). Therefore, the presence
of cyber-attack is on the rise due to the fact that investors are not willing to invest their money in
getting the solution to the problems. The authors recommend that it is vital for the firms to make
this form of investment. When a solution to this problem is found, it will be shared with other
stakeholders who will ensure that they secure their data. In addition, the shared answers to the
problem would be put under investigation with the aim of improving the status of the current
RESEARCH PROPOSAL 14
solution. Therefore, it is the role of the firms to ensure that they put aside some cash that would
be used in the research of this issue. This will also be part of an investment as it will reduce the
occurrence of the cybercrime in the future leading to the prosperity of the businesses in the
future.
Moreover, Katz David analyzed the dangers that businesses engaging in the online
money transfers encounterwith respect to cyber security. The electronic money transfer requires
that there be a designed program that allows the success of the transaction. Sometimes different
firms dealing with the same line of production can decide to do their business together despite
that they could be thousands of miles away. One of the firms could be requiring for the raw
materials while the other firm could be working as a supplier to the goods produced. On this
issue, it would be good for the come up with the best mode of online transaction. However,
transaction process could be hacked and the money is diverted to other places leading to a great
loss. One of the scams involved in this form of cybercrime is the Business Email Compromise
(BCE). The scam has been identified as the one leading to a loss of 3.1 billion dollars every year
for the companies that are looking to pay for the services offered to them from the overseas
firms. The author recommends that such firms are traced and the culprits are subjected to the full
force of the law. In addition, the author explains the importance of introducing other programs
3.1 Introduction
In this section, I will outline the research methodology that will be used in the actual
project as this is a research proposal. I will define the research strategy, the research methods,
research approach, methods of data collection, and the types of data analysis that will be used in
the analysis state, the ethical considerations and the research limitations of the project.
The research strategy that will be used in this project is an applied one. The research
question wants to know is sandboxing should be done to our computer system or firms should
develop other strategies. In this section, I will heavily rely on other people’s findings in
collecting my data. Therefore, the proposed project will have a shape of a new research but will
This research will take the form of qualitative research method. The qualitative research
usually uses a small sample that cannot be quantified. Therefore, the research method will give
into account the description of the situation. Since we are dealing with the cybercrime, we are
going to look at the that different methods used to protect the computers from malicious damage
and relate them to sandboxing. The qualitative method approach will important as it will offer a
complete description and analysis of the project research without limiting the scope and the
The research approach that will be used in the project is the inductive approach. In this
approach, I will take an observation of the research question and relate it to what is happening as
RESEARCH PROPOSAL 16
the usual practice. The observation made will then be used to design and generalize the theories
that are based on the research. In addition, these observations are going to be used to draw
conclusions from the research. The inductive approach of doing research is vital as it focuses on
the points where the research efforts are active (Katz, 2017). Also, inductive research is essential
and effective when dealing with small samples of the population. On the other hand, the research
approach used will have a weakness due to the small sample used to draw the conclusion and
generalize the theories. It is assumed that the smaller the sample sizes the higher the chances of
committing the errors. However, I will design and divide my population size in such a way that I
will collect the best samples that will be used to deliver on the project.
The most effective method of collecting data in this project will be the use of
theunstructured interview. The interview is a very important method of collecting data in the
inductive research method. I will be able to ask questions directly to the affected party and ask
for clarification in case I do not understand. An unstructured interview is important for this for
research as it gives a road to ask extra questions with a view of getting the depth of the answer.
The interview also helps both the interviewer and the interviewee to express their emotional
feeling that will drive to the depth of the matter as far as the cybercrimes are concerned. The
only weakness that can be established in this form of collecting data entails the time
management. While making an interview, the respondent can make a long response that could
have been minimized if the interview was structured one. In addition, the unstructured interview
as a mode of collecting data can lead to the interviewer forgetting some of the questions that
could be useful in deducing the final observation. However, I am looking forward to minimizing
this error by taking notes of the important questions that I will as.
RESEARCH PROPOSAL 17
In relation to the tool of collecting data during the interview, I will use the semi-
structured questionnaire. The semi-structured questionnaire will only be made to carry the most
important questions during the interview. The semi-structured questionnaire is normally not
given to the respondent but acts as a marking scheme of the interview. In addition, I would carry
with me a recording tape as a tool for collecting data. A recording tape is an important gadget of
storing the spoken conversation during the interview process. This is because the interviewer will
only be required to talk and will not distract the interview while writing the responses on a piece
of paper. The recording tape also ensures that the interviewer reviews the responses given by the
respondent when making an analysis. This will help in improving the accuracy in drawing the
The sample selection technique is very important for this research. It is wise to
acknowledge the importance if this research in regard to the wellness the society at large.
Therefore, I am considering using the purposive sample selection technique. In this regards, the
technique does not allow the use of probability in choosing the sample. Rather, the technique
allows the researcher to use avarious individual with the knowledge of the topic under
investigation. Not much of the society who understands the computer programming and the
factors that contribute to the cybercrime. Therefore, the research will only be undertaken by the
cyber professionals who will form the limited sample size. The professional’s relationship with
the experience in the cyber security platforms will have additional information that can be given
and be used in making the final conclusions. In addition, the sample size is chosen through this
means for the purpose of engaging only the people with the professional background in
Information Technology and has in most part of their lives used the computers in their places of
RESEARCH PROPOSAL 18
work. If the research took the probability nature of engagement, it would create some biases
since some of the people being interviewed would not know anything concerning the cyber
security.
The research will commence upon the approval of the project proposal by the concerned
parties. In addition, the respondents will not be forced to participate but will do so under their
will. We have to respect individual decisions as it is their rights. We are determined to begin the
research in April 2017 and work on it until the end of June 2017. Given that our respondents are
professionals, we are determined to get them in their place of work or any other destination of
their choice. This will create a conducive environment for our respondents that will allow them
to freely express themselves. We are also considering not limiting the respondent’s time when
giving their remarks. In addition, we are looking to carry the writing materials where we shall be
recording notes while recording the interview on the recording tape. This will give us enough
The content of the interview will be analyzed by a system of data analysis called the
Content Analysis. Since this is a recorded data, content analysis will be important as it allows the
researcher to create topic and sub-topics in tabulated form so that they can be compared. The
advantage of this form of data analysis is that it allows the data collected to be simplified on
what was agreed on and what the difference was. In addition, the content analysis helps in
producing results that can be accounted for using quantitative techniques. In addition, the content
analysis technique is vital as it gives the researcher the freedom to distribute the data in
accordance to the research question, hence making align with the research objectives and
RESEARCH PROPOSAL 19
therefore producing the best answer to the question. However, the content analysis depends on
the researcher’s ability to interpret the data collected. If the research is unable to correctly
interpret the data, he or she risks making an error that could lead toapoor conclusion of the event
would be vital for me to have a clarification on any matter that will require being interpreted
during the interview. This will increase the chances of me getting the best answers required for
This research will observe the ethical measures with regards to the responded making an
independent decision to participate in the interview. As noted earlier, the research process will
not force anyone to give their opinion. We also know that at a time the respondents may feel that
they want to leave the pact of the sample. Therefore, I have designed a Debriefing and
Withdrawal letter that will be signed by the respondents. Secondly, it is worth to note that this
research will be undertaken in a voluntary manner. Therefore, the respondents should not expect
to be rewarded as it will amount to corruption. Therefore, we are asking the respondents to weigh
their willingness to participate without there being any condition. This ethical consideration will
ensure that the interview conducted is transparency and accountability of resources will be
realized.
Also, the ethical consideration will take a form of making the responses of the
respondents confidential. We acknowledge the fact that respondents can give us some secrets
that they would not want to be heard by any other members. In this regards, we will inform the
respondents that the data collected are purely for academic purposes and their rights will not be
infringed. We are also ensuring our sample of the population that we are not going to intimidate
RESEARCH PROPOSAL 20
them by physically or psychologically abusing them. Rather we are only interested in asking
questions that are direct and means no harm to them, their work and family. Therefore, we are
assuring them of the best professional competency during our research period and more so
At the end of the research, I will give an outline of the limitations to my project. The king
of hindrances that were encountered and the challenges faced on the field will be outlined.
Lastly, the limitation section would show the specificgoals that were unable to be achieved in the
research process. Therefore, the project will have an outlook that focuses on the achievements
and failures leaving a gap that would be pursued by other researchers in the future.
Preliminary research
Decide methodology
Submit/present proposal
Finalise methodology
Conduct research
Analyse data
Write up
Submit assignment
Wk10
Wk11
Wk12
Wk13
Wk14
Wk15
Wk16
Wk17
Wk18
Wk19
Wk20
Wk21
Wk22
Wk23
Wk24
Wk6
Wk7
Wk8
Wk9
RESEARCH PROPOSAL 21
References
Bryant, WD 2016, 'Mission Assurance through Integrated Cyber Defense', Air & Space Power
Journal, 30, 4, pp. 5-17, Academic Search Premier, EBSCOhost, viewed 9 April 2017.
Chacko, L, Sekeris, E, & Herbolzheimer, C 2016, 'Can You Put a Dollar Amount on Your
Company's Cyber Risk?', Harvard Business Review Digital Articles, pp. 2-5, Business
Qualitative and Quantitative Study', International Management Review, 13, 1, pp. 37-58,
Harrop, W, & Matteson, A 2013, 'Cyber resilience: A review of critical national infrastructure
and cyber security protection measures applied in the UK and USA', Journal Of Business
Hewes, JA 2016, 'Threat and Challenges of Cyber-Crime and the Response', SAM Advanced
KATZ, DM 2017, 'The Corporation of Cyber Crime', Cfo, 33, 1, pp. 26-31, Business Source
Kshetri, N 2010, 'Diffusion and Effects of Cyber-Crime in Developing Economies', Third World
March 2017.
Lin, H 2016, 'Attribution Of Malicious Cyber Incidents: From Soup To Nuts', Journal Of
International Affairs, 70, 1, pp. 75-137, Business Source Complete, EBSCOhost, viewed
9 April 2017.
Lukasik, Sj 2011, 'Protecting Users of the Cyber Commons', Communications Of The ACM, 54,
Crime', Megatrend Review, 11, 4, pp. 279-299, Business Source Complete, EBSCOhost,
North, J, & Pascoe, R 2016, 'Cyber security and resilience -- it's all about
Professionals (UK Edition), pp. 20-23, Business Source Complete, EBSCOhost, viewed
15 March 2017.
RESEARCH PROPOSAL 23
Edition), pp. 18-21, Business Source Complete, EBSCOhost, viewed 9 April 2017.
Putte, D, & Verhelst, M 2013, 'Cyber crime: Can a standard risk analysis help in the challenges
2017.
Rollins, A. (2016). Facing the Cyber Challenge. Journal Of The Australian & New Zealand
Seong-kee, L, & Tae-in, K 2015, 'Adaptive Multi-Layer Security Approach for Cyber
Defense', Journal Of Korean Society For Internet Information, 16, 5, pp. 1-9, Business
Sleiman, C 2017, 'Combat Cyber Crime in 2017', Businesstoday, 219, pp. 1-3, Business Source
Applied Sciences, pp. 687-692, Business Source Complete, EBSCOhost, viewed 9 April
2017.
Whitler, K, & Farris, P 2017, 'The Impact of Cyber Attacks On Brand Image', Journal Of
Advertising Research, 57, 1, pp. 3-9, Business Source Complete, EBSCOhost, viewed 9
April 2017.