You are on page 1of 23

RESEARCH PROPOSAL 1

Cyber Security Research Proposal – Sandboxing

Name

Institution
RESEARCH PROPOSAL 2

Chapter 1: Introduction

1.1 Research Overview

Sandboxing is a very important task in important in improving the cyber security. Cyber

security refers to the protection of any internet run program from threats that include hacking,

viruses, and others. Most of the institutions are always at a threat of being attacked or hacked.

For example, financial institutions usually carry out their transactions via the internet. Their

cyber security could be at threat if they are not well secured. Therefore, they could lose a lot of

cash to the cyber criminals (North & Pascoe, 2016). This brings in the importance of having a

trusted source that will protect the programs being run to serve an institution. Sandboxing

becomes an important part of the cyber security system to the institution’s programs. The

sandboxing works by separating the institution's programs from untrusted and unverified sources

which are usually the third parties, suppliers, and other users’ websites that could harm the

operations of the host. In many cases, the sandboxing helps to protect the host machines from

being invaded by the viruses that come in from the activities of the third party (Porter, 2016). If

the machine of the host I affected, it becomes makes it too hard for operations especially when

visiting the websites.

The world that we are living in today is becoming very useful for a person to work using

a computer. The operation system of a computer is supposed to be out of infections so that it can

enhance and increase the work rate of the user (Jenab&Moslehpour, 2016). The computers have

a lot of programs that are used to run various departments of the firm. For example, the

accounting department of the firm is useful as it keeps the financial operations of the firm to

move on smoothly. The accountability and transparency of the firm’s financial stature are

important to the firm and the country at large. First, it ensures that every coin is spent on what it
RESEARCH PROPOSAL 3

was planned for at the beginning. Secondly, the firms usually pay taxes to the government. It is

only through a wellworked programthat will ensure that the firm calculates the correct amount

that would then be paid to the government. If the machine that contains the data in the finance

office is corrupted by the virus, this work would become difficult to perform. The virus would

cause a lot of delays leading to poor calculations and submission of incorrect figures.

In addition, computers that are programmed to perform different task do improve the

working rate of a firm (O'Flaherty, 2015). In this regard, the firm would hire a few people to

perform a task that would otherwise require a multitude of workers to work manually. Programs

are designed in a way that they make the performance quick by the click of a button. For

example, most of the financial institutions such as banks and insurance firms do use some

specific programs to calculate the interest that is accrued on a given amount of money that is

either loaned out or deposited by their customers. The programs used are vital in making the

work easier, ensuring that the employees do not make errors in their computations

1.2 Background of the Study

The world today is highly depending on the technology as a means of production. In this

case, the production does not only mean the factory processing of raw materials to finished

products (Whitler& Farris, 2017). The service industries also depend highly on the development

of technology. For example, the communication sector of any country in the world is highly

depending on the development of mobile phones and the mobile networks. The procession

industries are also depending on the development of technology where machines are controlled

by the press of a computer button. Therefore, there is an increased need to have the efficiency in

the computer systems so that the production can continue without there being a huge challenge.
RESEARCH PROPOSAL 4

The computer software and the hardware system are a crucial part of the entire

development of resources with respect to technology (Spalevic, 2014). The scientific research

that leads to the development of applications to be used to run different parts of the machineryis

stored on the hard disk. Thissoftware requires being well kept and secured from some unsafe

programs that could lead to their destruction. Secondly, people do invest a lot of money, energy

and time in trying to come up with software that is to be used in various investments. These

forms of investment requireproducing a return to the person of acompany that is developing

them. However, if the computer system is not well secured, some uncouth individuals could hack

into the computer and steal the programs. The stolen programs could then be sold at a very cheap

cost to other firms leaving the person or company that developed the software empty handed.

This practice has been happening for most of the firms around the world. This is one of the areas

that prompt me to carry out the research on this area.

Secondly, the development of the technology has been incapacitated by the malware. The

malware is a form of software virus that is made for the purpose of blocking and damaging other

people’s computers. They first make the processing of the data slow and then disable the

programs (Bryant, 2016). Therefore, the scientist could be unable to implement the technology

that they were working for. This practice can be dangerous to the development of the technology

around the world. First, the intended technology would be unable to be passed to the next user. If

the user was intending to use it in the development of the production process, the production

would remain the same. In addition, if the technology was already in use for the production of

goods and services, the machine that was being run by the program would fail to lead to the

failure of the production. The effect of this failure can be felt by a lot of people including the

people that were depending on the product or the service for their livelihood. In addition, the
RESEARCH PROPOSAL 5

producing firm will fail to make the profit as required leading to a lot of losses. The losses made

could be dangerous to the firm, the employees and the country at large. Therefore, there is a great

need to seek for a formula that would be used to ensure that the functioning of the computers is

not affected by any other program from other malicious sources.

The use of computer programs varies from one place to the other. The programs that are

designed for industrial use are different from the ones designed for the domestic or the ones used

at home (Dahbur et al., 2017). In most of the times, the people using the computers for different

tasks do not know about the viruses that can affect their system at any given time. Therefore, the

users fail to understand what has happened to their computers when they fail to function as

required. For example, the students taking different courses other than sciences could be using

the computers to work on their essays, do research work and other work (Kshetri, 2010). In

addition, people with small businesses could be using their computers to list the stock and sales

and compute on the cash flow. Other users who are common but non-specialists in the

information technology are the people who use the gadget to download and watch movies, listen

to music and play computer games. Research shows that this category forms the majority of the

computer program users, but have very little knowledge concerning the threats that harm their

devices now and then. This group of users requires that the computers they are using be

programmed by a specialized so that they cannot be harmed by the malware. The pre-

programmed computers are vital for the running of the daily business as a means of ensuring that

they pursue the social and economic development of the society. Therefore, the Information and

Technology scholars have encouraged firms to put proper programs that will ensure that the

computers produced are installed with the antivirus programs. These computers would, therefore,

serve the clients for a long time without being infected.


RESEARCH PROPOSAL 6

1.3 Aim of the Study

The current study aims at establishing the use of sandboxing as a means of protecting the

computer devices from being affected by the malware. This study is crucial as it will determine

the need of sandboxing in relation to the safety of the data stored in the computer. Sometimes

professionals in this field do have different views on this issue. Therefore, the study will aim at

creating the boundary and installing the confidence to the computer users who will have an

answer on whether they should allow sandboxing as a means of protecting their data or they are

supposed to pursue other technological means.

1.4 Objectives of the Study

 To investigate the dangers caused by Cyber Crimes in the business sector around

the world

 To identify the needs and the limitations of sandboxing in relation to data and

program protection in a computer

 To identify the security system attributed to the conventional defense, the

Advance Threat Protection (ATP), and of the computer programs

1.5 Research Questions

 What effect does the cybercrime caused to the businesses are research firms in the

world?

 What are the known methods that can be used to intercept and remove harmful

programs that could interfere with the computerized programs used to run a

specific function in the production of goods and services?

 Does the cyber industry require sandboxing as a measure of protection to the

important programs that are run by the computer?


RESEARCH PROPOSAL 7

Chapter 2: Literature Review

Introduction

Recent studies show that the majority of the firms around the world is engaged in the

safety measures that would protect their cyber system. However, in the developing world, most

of the cyber users are not aware of the programs that might affect their computer programs.

Therefore, they are often faced with complications when their computer programs are infected by

the viruses (Lukasik, 2011). This problem does not only happen to the information and

communication technologists in the developing world. There is also a group of victims in the

developed world. Therefore, there is a great need for the whole population to know about how

they can manage their computers from being manipulated by the practices of other malicious

cyber criminals.

Literatures that have been compiled by the Information and Technology scholars mostly

focus on the Cyber Crimes. Cybercrime is a broad topic that has attracted most of the authors to

provide an insight of what the corporates and the public should expect (Ayral&O'donnell, 2016).

This section examines and explains the various researches that have been undertaken by

researchers in line with this topic. The examination would then give way for the gap that have

been left out and which this research seeks to address.

Literatures on threats of the cyber crimes

Hewe and Alexander made a research on the threats and challenges of Cyber Crime and

the response that should be taken by the user (Hewe, 2016). The authors realized the fact that the

use of computer programs is vital for the running of the organization. The authors outlined

various risks that organizations suffer due to cyber-attack. Organizational accountability is one

of the major risks that any firm would suffer in case the computer programs are attacked by the
RESEARCH PROPOSAL 8

malware. The organizations are supposed to give an account for various activities including the

monetary budgeting. This is the most important part of any company’s activity as it offers the

cash flow to various sectors (Seong-kee& Tae-in, 2015). The government requires that all firms

present their cash flow activities to the public if they are publicly owned. In addition, the

accounting department usually budgets for every coin in a given financial year. However, if the

computer program that runs these activities is affected, then the accountability of the firm and the

budgetary programs would be lost. Industrial management is another risk that is considered in

this research (Perez, 2016). According to Hewe (2016), industries depend highly on the computer

programs in their management. Industrial management discussed by the authorsincludes the use

of computer management to set out the different production processes where the industries are

capital intensive. In the modern industries, the firm managers usually usecomputerized robots

that operate under the command of computer programs. If these programs are interfered with by

the malware, they would make the production process very difficult to manage. In addition, the

authors described the importance of the computer programs in aligning the group decision

making with regards to executive reports (Harrop& Matteson, 2013). The authors gave an

example of brainstorming as an important task in innovation in the production of goods and

services. The stages of innovation requirebeing stored and be discussed by various groups that

make the final decision. Finally, the two authors discussed the needs to protect the computer

users against the cybercrimes for the general enhancement of the production of goods and

services.

Cyber Crime and Business Continuity

Putte and Verhelst also conducted a research on the Cyber Crime. Their research question

was in the relation to the cyber Crime challenged the continuity of businesses (Putte&Verhelst,
RESEARCH PROPOSAL 9

2013). The two authors intended to know the reason why business managers get challenged by

the cyber threats that make them even fail to get over after a cyber-crime. The infection of the

computer programs by viruses causes a lot of dysfunction of the business processes. Therefore,

the authors provide the Risk management in business with regard to the operations that are made

possible by the use of computerized programs. One of the risks that can bring business

operations to a halt is the realization that the computer facilities that are used to run some

programs are infected by viruses. The authors acknowledged the fact that the process required to

mitigate cybercrimes are becoming harder due to the sophistication of the challenges. Therefore,

it calls for the software development managers to invest highly on the methods that should be

used to bring these threats to an end. However, there are no major solutions that have been

forwarded that can completely help to wind out these challenges. As the software developers find

a solution to one of the problem, the problem develops to another level. Since the managers and

the software developers are supposed to research on the program, they invest a lot of their time

and effort trying to create a sandbox that will help to solve the problem. While doing this, the

business being operated using thissoftware can be highly affected leading to a lot of losses. If the

managers were light-hearted, they end up being affected and sometimes move away from the

sector. This could be discouraging to the aspiring managers and investors who learn that their

businesses and investments can be harmed by and be reduced to losses. Therefore, the author’s

calls for the software developers to ensure that they come up with the programs that would

ensure that the computers used for various functions are free from viruses and dangers.

Effects of Cyber Crimes

Matijasevic and Jelena(2014) are another set of authors who composed a research

concerning the procedures that can be used to bring to an end on the Cyber Crime. The authors
RESEARCH PROPOSAL 10

acknowledged that Cyber Crime is a global problem just like the terrorist activities. The

repercussions of the cybercrime affect the whole world. Therefore, the authors call for the global

response towards the menace. According to the authors, different countries have different

technological capabilities. The developed nations are in a better position to identify the

individuals that are associated with the cybercrimes. They are the source of the technologies that

are used globally. On the other hand, the developing countries are the consumers of the computer

products that are produced by the industrial nations. Although the developing world is the

leading consumer, the liberal market integrations have enabled the developed nation to seek to

expand their activities to the growing nations. Therefore, the threat caused by the cybercrimes

affect all the stakeholders. This form of integration constitutes a suitable platform for the

software developers to find the source of the cybercrimes. Finding the source of crime would be

better than applying sandboxing to every program in the computers. In addition, the authors

suggest that the international players come up with the criminal Act that would be used to tame

the cyber criminals. The cybercrime Act will be made and be integrated to the international law.

In this regards, the criminals would be punished equally regardless of their nationalities. The

European Union has been in the forefront in establishing such an Act. All the countries within

the union have harmonized their Cyber Criminal law into the agreed proposal. The law is

projected to establish a secure standard that would be used to deal with the criminal activities.

Cyber terrorism

Adrian Rollins also conducted a research in the cybercrime. According to Rollins,

cybercrime has widely been used in the development of terrorist’s activities (Rollins, 2016). This

form of crime is being referred to as cyber terrorism. The terrorists do hack into

institutions’network where they steal the data that they use to plan and execute terrorist activities
RESEARCH PROPOSAL 11

around the world. The most affected are the government institutions, especially the military

system. These amounts to computer crimes as the programs are designed using the programmed

computers. According to Rollins, the terrorists usually steal the government’s data and secrets

concerning their missions. It is for these reasons that the terrorist is able to tell the plans that the

government has and they can counter it without a sweat as they already aware of the plan.

Therefore, the author recommends that the cyber security issues be streamed up to ensure that the

government secrets are withheld from the outside world. Rollins also argues that the United

States of America’s security system is largely influenced by the retail market industry in the

country. As the retail market invest highly on online marketing, the government gets into the

action as a watch list of the activities. In other words, the government does control the online

activities of the online retail shops for the purpose of ensuring transparency in taxes submissions.

The terrorists use this link to enter into the government’s cyber programs where they hack and

steal their data. Therefore, the author suggests that the government seal the gaps that are

allowing the terrorists to steal their data by investing highly in the cyber technology.

Government Responsibilities in Securing the Cyber

Warwick Ashford also composed a research concerning the rate at which the

governments and other institutions are responding to the cyber-criminal activities (Ashford,

2016). The criminal activities require being encountered as soon as they are noticed. This ensures

that the public is not highly affected by the criminals. In this regards, Ashford was investigating

the rate at which the Great Britain government was encountering this criminal activity. The

author used the National Crime Agency (NCA) data in the Great Britain to conduct his research

(Lin, 2016). The findings of the research were that there was a little response from the

government agencies in encountering the criminal activities. This research suggests that the rate
RESEARCH PROPOSAL 12

at which the cybercrimes were worldwide exceeding the rate at which individuals and

government institutions are responding towards the crime. Therefore,themajority of cyber

offenders are walking free due to the weaknesses in our Cyber Security system. This finding

could be dangerous to the development of our country and the world at large. First, consider that

the Great Britain has a huge capacity to deal with the cybersecurity issues compared to other

developing countries. Therefore, the country could be expected to have an immediate response

team that would be used to counter these crimes. This means in most of the developing world,

there is very little of no response to this risk.This could be the reasons why terrorist activities are

being witnessed in major cities of Europe. As the terrorists know that the cyber security breach

would not be noticed, they may be opting to hack on the government institutions where they find

about the security arrangements. Then, they criminals could be using the funding to corrupt the

government data making them unable to come into attention when the terrorist’s activities are

being planned and executed. The author recommends that the government increase the rate at

which they are responding to the cybercrime issues.

In addition, Cherif Sleiman conducted a research on the cost of combating the cybercrime

in Oman. Oman is one of the upcoming economic giants in the Middle East (Sleiman, 2017). The

use of the computer programs to send, receive and store data is on the rise. However, the

problem of cyber security that faces the entire world is also available in Oman. In this country,

the author states that the government in conjunction with the private entities is working hard to

take this menace. However, the rate at which the cybercrime is growing is saddening. The efforts

that are being made involve developing antivirus that can detect and automatically delete the

virus being used to interrupt the computer system. Sleiman acknowledges the fact that having

computers as a data storage venue is vital for the performance of businesses in the private and
RESEARCH PROPOSAL 13

the public sector. However, he acknowledges the fact that the businesses fall at risk of losing

their data through the manipulation of the malware. It is for this reasons that he calls for the

business enterprises to ensure that they take the necessary security measures that would ensure

the safety of their data. Therefore, he recommends that every business enterprise to have at least

one specialized information and technology employee who would be designing programs that are

resistance to the virus. The author says that the use of the programmed computers in the running

of daily business activities should not be halted due to the data infections by malicious programs.

The use of technology in the 21st century is vital in ensuring that the country and the world at

large create efficiency in the production process. Therefore, he recommends that firm tries to use

other programs that would ensure that the business data are safe at all the time.

Leslie et al., (2016)also put their effort in conducting their research in this field. The

research was used to determine the level of investment that firms make in ensuring the

prevention of cyber insecurity. In other words, the researchers were investigating the level of

capital that is used in developing software that can be used to take the cyber insecurity. The

authors state that it is a fact that cybercrimesare on the rise. But what are the causes of the

increase in cybercrimes? For the answers to these questions to be revealed, the authors made an

inquiry on the same to various companies. However, they found out that majority of the firms do

not invest their money on the cyber-related activities(Leslie et al., 2016). Therefore, the presence

of cyber-attack is on the rise due to the fact that investors are not willing to invest their money in

getting the solution to the problems. The authors recommend that it is vital for the firms to make

this form of investment. When a solution to this problem is found, it will be shared with other

stakeholders who will ensure that they secure their data. In addition, the shared answers to the

problem would be put under investigation with the aim of improving the status of the current
RESEARCH PROPOSAL 14

solution. Therefore, it is the role of the firms to ensure that they put aside some cash that would

be used in the research of this issue. This will also be part of an investment as it will reduce the

occurrence of the cybercrime in the future leading to the prosperity of the businesses in the

future.

Cyber Security and Money Transfer

Moreover, Katz David analyzed the dangers that businesses engaging in the online

money transfers encounterwith respect to cyber security. The electronic money transfer requires

that there be a designed program that allows the success of the transaction. Sometimes different

firms dealing with the same line of production can decide to do their business together despite

that they could be thousands of miles away. One of the firms could be requiring for the raw

materials while the other firm could be working as a supplier to the goods produced. On this

issue, it would be good for the come up with the best mode of online transaction. However,

transaction process could be hacked and the money is diverted to other places leading to a great

loss. One of the scams involved in this form of cybercrime is the Business Email Compromise

(BCE). The scam has been identified as the one leading to a loss of 3.1 billion dollars every year

for the companies that are looking to pay for the services offered to them from the overseas

firms. The author recommends that such firms are traced and the culprits are subjected to the full

force of the law. In addition, the author explains the importance of introducing other programs

that would useful for the online cash transaction


RESEARCH PROPOSAL 15

Chapter 3: Research Methodology

3.1 Introduction

In this section, I will outline the research methodology that will be used in the actual

project as this is a research proposal. I will define the research strategy, the research methods,

research approach, methods of data collection, and the types of data analysis that will be used in

the analysis state, the ethical considerations and the research limitations of the project.

3.2 Research strategy

The research strategy that will be used in this project is an applied one. The research

question wants to know is sandboxing should be done to our computer system or firms should

develop other strategies. In this section, I will heavily rely on other people’s findings in

collecting my data. Therefore, the proposed project will have a shape of a new research but will

use the old data and findings.

3.3 Research Method

This research will take the form of qualitative research method. The qualitative research

usually uses a small sample that cannot be quantified. Therefore, the research method will give

into account the description of the situation. Since we are dealing with the cybercrime, we are

going to look at the that different methods used to protect the computers from malicious damage

and relate them to sandboxing. The qualitative method approach will important as it will offer a

complete description and analysis of the project research without limiting the scope and the

responses from the participants.

3.4 Research approach

The research approach that will be used in the project is the inductive approach. In this

approach, I will take an observation of the research question and relate it to what is happening as
RESEARCH PROPOSAL 16

the usual practice. The observation made will then be used to design and generalize the theories

that are based on the research. In addition, these observations are going to be used to draw

conclusions from the research. The inductive approach of doing research is vital as it focuses on

the points where the research efforts are active (Katz, 2017). Also, inductive research is essential

and effective when dealing with small samples of the population. On the other hand, the research

approach used will have a weakness due to the small sample used to draw the conclusion and

generalize the theories. It is assumed that the smaller the sample sizes the higher the chances of

committing the errors. However, I will design and divide my population size in such a way that I

will collect the best samples that will be used to deliver on the project.

3.5 Data collection methods and tools

The most effective method of collecting data in this project will be the use of

theunstructured interview. The interview is a very important method of collecting data in the

inductive research method. I will be able to ask questions directly to the affected party and ask

for clarification in case I do not understand. An unstructured interview is important for this for

research as it gives a road to ask extra questions with a view of getting the depth of the answer.

The interview also helps both the interviewer and the interviewee to express their emotional

feeling that will drive to the depth of the matter as far as the cybercrimes are concerned. The

only weakness that can be established in this form of collecting data entails the time

management. While making an interview, the respondent can make a long response that could

have been minimized if the interview was structured one. In addition, the unstructured interview

as a mode of collecting data can lead to the interviewer forgetting some of the questions that

could be useful in deducing the final observation. However, I am looking forward to minimizing

this error by taking notes of the important questions that I will as.
RESEARCH PROPOSAL 17

In relation to the tool of collecting data during the interview, I will use the semi-

structured questionnaire. The semi-structured questionnaire will only be made to carry the most

important questions during the interview. The semi-structured questionnaire is normally not

given to the respondent but acts as a marking scheme of the interview. In addition, I would carry

with me a recording tape as a tool for collecting data. A recording tape is an important gadget of

storing the spoken conversation during the interview process. This is because the interviewer will

only be required to talk and will not distract the interview while writing the responses on a piece

of paper. The recording tape also ensures that the interviewer reviews the responses given by the

respondent when making an analysis. This will help in improving the accuracy in drawing the

conclusions of the interview.

3.6 Sample selection

The sample selection technique is very important for this research. It is wise to

acknowledge the importance if this research in regard to the wellness the society at large.

Therefore, I am considering using the purposive sample selection technique. In this regards, the

technique does not allow the use of probability in choosing the sample. Rather, the technique

allows the researcher to use avarious individual with the knowledge of the topic under

investigation. Not much of the society who understands the computer programming and the

factors that contribute to the cybercrime. Therefore, the research will only be undertaken by the

cyber professionals who will form the limited sample size. The professional’s relationship with

the experience in the cyber security platforms will have additional information that can be given

and be used in making the final conclusions. In addition, the sample size is chosen through this

means for the purpose of engaging only the people with the professional background in

Information Technology and has in most part of their lives used the computers in their places of
RESEARCH PROPOSAL 18

work. If the research took the probability nature of engagement, it would create some biases

since some of the people being interviewed would not know anything concerning the cyber

security.

3.7 Research process

The research will commence upon the approval of the project proposal by the concerned

parties. In addition, the respondents will not be forced to participate but will do so under their

will. We have to respect individual decisions as it is their rights. We are determined to begin the

research in April 2017 and work on it until the end of June 2017. Given that our respondents are

professionals, we are determined to get them in their place of work or any other destination of

their choice. This will create a conducive environment for our respondents that will allow them

to freely express themselves. We are also considering not limiting the respondent’s time when

giving their remarks. In addition, we are looking to carry the writing materials where we shall be

recording notes while recording the interview on the recording tape. This will give us enough

evidence that shall be used in analyzing the data.

3.8 Data analysis

The content of the interview will be analyzed by a system of data analysis called the

Content Analysis. Since this is a recorded data, content analysis will be important as it allows the

researcher to create topic and sub-topics in tabulated form so that they can be compared. The

advantage of this form of data analysis is that it allows the data collected to be simplified on

what was agreed on and what the difference was. In addition, the content analysis helps in

producing results that can be accounted for using quantitative techniques. In addition, the content

analysis technique is vital as it gives the researcher the freedom to distribute the data in

accordance to the research question, hence making align with the research objectives and
RESEARCH PROPOSAL 19

therefore producing the best answer to the question. However, the content analysis depends on

the researcher’s ability to interpret the data collected. If the research is unable to correctly

interpret the data, he or she risks making an error that could lead toapoor conclusion of the event

and unreliable recommendations of the solutions to be adopted by the company. Therefore, it

would be vital for me to have a clarification on any matter that will require being interpreted

during the interview. This will increase the chances of me getting the best answers required for

the topic under the research.

3.9 Ethical considerations

This research will observe the ethical measures with regards to the responded making an

independent decision to participate in the interview. As noted earlier, the research process will

not force anyone to give their opinion. We also know that at a time the respondents may feel that

they want to leave the pact of the sample. Therefore, I have designed a Debriefing and

Withdrawal letter that will be signed by the respondents. Secondly, it is worth to note that this

research will be undertaken in a voluntary manner. Therefore, the respondents should not expect

to be rewarded as it will amount to corruption. Therefore, we are asking the respondents to weigh

their willingness to participate without there being any condition. This ethical consideration will

ensure that the interview conducted is transparency and accountability of resources will be

realized.

Also, the ethical consideration will take a form of making the responses of the

respondents confidential. We acknowledge the fact that respondents can give us some secrets

that they would not want to be heard by any other members. In this regards, we will inform the

respondents that the data collected are purely for academic purposes and their rights will not be

infringed. We are also ensuring our sample of the population that we are not going to intimidate
RESEARCH PROPOSAL 20

them by physically or psychologically abusing them. Rather we are only interested in asking

questions that are direct and means no harm to them, their work and family. Therefore, we are

assuring them of the best professional competency during our research period and more so

during the interview sessions.

3.10 Research limitation

At the end of the research, I will give an outline of the limitations to my project. The king

of hindrances that were encountered and the challenges faced on the field will be outlined.

Lastly, the limitation section would show the specificgoals that were unable to be achieved in the

research process. Therefore, the project will have an outlook that focuses on the achievements

and failures leaving a gap that would be pursued by other researchers in the future.

Gantt Chat for the project

Choose research area

Preliminary research

Decide research topic

Decide methodology

Submit/present proposal

Finalise methodology

Conduct research

Analyse data

Write up

Submit assignment
Wk10

Wk11

Wk12

Wk13

Wk14

Wk15

Wk16

Wk17

Wk18

Wk19

Wk20

Wk21

Wk22

Wk23

Wk24
Wk6

Wk7

Wk8

Wk9
RESEARCH PROPOSAL 21

References

Ashford, W 2016, 'Security industry largely welcomes NCA's cyber crime

recommendations', Computer Weekly, pp. 4-7, Business Source Complete, EBSCOhost,

viewed 15 March 2017.

Ayral, T, &O'donnell, J 2016, 'Minimize industrial cyber security risk in plants in 12

steps', Hydrocarbon Processing, 95, 7, pp. 55-58, Academic Search Premier,

EBSCOhost, viewed 9 April 2017.

Bryant, WD 2016, 'Mission Assurance through Integrated Cyber Defense', Air & Space Power

Journal, 30, 4, pp. 5-17, Academic Search Premier, EBSCOhost, viewed 9 April 2017.

Chacko, L, Sekeris, E, & Herbolzheimer, C 2016, 'Can You Put a Dollar Amount on Your

Company's Cyber Risk?', Harvard Business Review Digital Articles, pp. 2-5, Business

Source Complete, EBSCOhost, viewed 15 March 2017.

Dahbur, K, Bashabsheh, Z, &Bashabsheh, D 2017, 'Assessment of Security Awareness: A

Qualitative and Quantitative Study', International Management Review, 13, 1, pp. 37-58,

Business Source Complete, EBSCOhost, viewed 9 April 2017.

Harrop, W, & Matteson, A 2013, 'Cyber resilience: A review of critical national infrastructure

and cyber security protection measures applied in the UK and USA', Journal Of Business

Continuity & Emergency Planning, 7, 2, pp. 149-162, Business Source Complete,

EBSCOhost, viewed 9 April 2017.

Hewes, JA 2016, 'Threat and Challenges of Cyber-Crime and the Response', SAM Advanced

Management Journal (07497075), 81, 2, pp. 4-10, Business Source Complete,

EBSCOhost, viewed 15 March 2017.


RESEARCH PROPOSAL 22

Jenab, K, &Moslehpour, S 2016, 'Cyber Security Management: A Review', Business

Management Dynamics, 5, 11, pp. 16-39, Business Source Complete, EBSCOhost,

viewed 9 April 2017.

KATZ, DM 2017, 'The Corporation of Cyber Crime', Cfo, 33, 1, pp. 26-31, Business Source

Complete, EBSCOhost, viewed 15 March 2017.

Kshetri, N 2010, 'Diffusion and Effects of Cyber-Crime in Developing Economies', Third World

Quarterly, 31, 7, pp. 1057-1079, Business Source Complete, EBSCOhost, viewed 15

March 2017.

Lin, H 2016, 'Attribution Of Malicious Cyber Incidents: From Soup To Nuts', Journal Of

International Affairs, 70, 1, pp. 75-137, Business Source Complete, EBSCOhost, viewed

9 April 2017.

Lukasik, Sj 2011, 'Protecting Users of the Cyber Commons', Communications Of The ACM, 54,

9, pp. 54-61, Business Source Complete, EBSCOhost, viewed 9 April 2017.

Matijašević-Obradović, J 2014, 'European Standards In The Field Of Combating Cyber

Crime', Megatrend Review, 11, 4, pp. 279-299, Business Source Complete, EBSCOhost,

viewed 15 March 2017.

North, J, & Pascoe, R 2016, 'Cyber security and resilience -- it's all about

governance', Governance Directions, 68, 2, pp. 146-151, Business Source Complete,

EBSCOhost, viewed 9 April 2017.

O'Flaherty, K 2015, 'Cyber-crime on the corporate agenda', SC Magazine: For IT Security

Professionals (UK Edition), pp. 20-23, Business Source Complete, EBSCOhost, viewed

15 March 2017.
RESEARCH PROPOSAL 23

Perez, R 2016, 'Cyber-security awareness', SC Magazine: For IT Security Professionals (UK

Edition), pp. 18-21, Business Source Complete, EBSCOhost, viewed 9 April 2017.

Porter, C 2016, 'TOWARD PRACTICAL CYBER COUNTER DECEPTION', Journal Of

International Affairs, 70, 1, pp. 161-174, Business Source Complete, EBSCOhost,

viewed 9 April 2017.

Putte, D, & Verhelst, M 2013, 'Cyber crime: Can a standard risk analysis help in the challenges

facing business continuity managers?', Journal Of Business Continuity & Emergency

Planning, 7, 2, pp. 126-137, Business Source Complete, EBSCOhost, viewed 15 March

2017.

Rollins, A. (2016). Facing the Cyber Challenge. Journal Of The Australian & New Zealand

Institute Of Insurance & Finance, 39(2), 1-4.

Seong-kee, L, & Tae-in, K 2015, 'Adaptive Multi-Layer Security Approach for Cyber

Defense', Journal Of Korean Society For Internet Information, 16, 5, pp. 1-9, Business

Source Complete, EBSCOhost, viewed 9 April 2017.

Sleiman, C 2017, 'Combat Cyber Crime in 2017', Businesstoday, 219, pp. 1-3, Business Source

Complete, EBSCOhost, viewed 15 March 2017.

Spalevic, Z 2014, 'Cyber Security As A Global Challenge Today', Singidunum Journal Of

Applied Sciences, pp. 687-692, Business Source Complete, EBSCOhost, viewed 9 April

2017.

Whitler, K, & Farris, P 2017, 'The Impact of Cyber Attacks On Brand Image', Journal Of

Advertising Research, 57, 1, pp. 3-9, Business Source Complete, EBSCOhost, viewed 9

April 2017.

You might also like