HYPOTHESIS: Understanding viruses and the dangers of hacker attacks in enterprises, as well as the importance of data security.
PROPOSAL OUTLINE:
Introduction- A brief overview of the present condition of cyber-attacks affecting businesses all around the world. Knowledge about the types of cyber-attacks that are occurring in the commercial world. Discuss the research proposal aims to identify a correlation among companies that have been breached in the past.
- Why do cyberattacks happen to businesses
- Norman 2019
- Hellwag 2017
- King 2017
- Importance of having cyber security
- Ali 2021
- Jindal 2014
- Perez 2016
- How to prevent cyber attacks from happening
- Werner 2017
- Thibodeau 2007
- N. Zealand MGMT 2015
Methodology:
- Look for 5-10 companies that lack cybersecurity within there business
- take the results of how many cyber attacks happened
- split companies into two groups
- half with cyber security, and have without
- results on how businesses improved and how many attacks happened
References:
Veasey, E.Norman. “Protection of Client Confidential Information from Cyberattacks Is a Compelling Business and Ethical Priority for Inside and Outside Corporate Counsel.” Business Lawyer, vol. 75, no. 1, Winter2019/2020 2019, pp. 1495–517. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=141377239&site=ehost-live&scope=site.
Werner, Randy R. “How to Protect Against Common Cyberattacks and Insure Against Potential Losses. (Cover Story).” CPA Journal, vol. 87, no. 3, Mar. 2017, pp. 16–21. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=121733191&site=ehost-live&scope=site.
HELLWIG, BASIA. “Cyberattacks on Small Businesses Can Be Costly.” Dance Retailer News, vol. 16, no. 12, Dec. 2017, p. 6. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=126353274&site=ehost-live&scope=site.
KING, PAM. “Small Businesses Can Brace for Cyberattacks.” Wyoming Business Report, vol. 18, no. 7, Oct. 2017, pp. 3–11. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=125823147&site=ehost-live&scope=site.
Thibodeau, Patrick. “Feds Hope to Boost Businesses’ Role in Slowing Cyberattacks.” Computerworld, vol. 41, no. 10, Mar. 2007, p. 16. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=24283191&site=ehost-live&scope=site.
“Deceptive New Cyber-Attack Tactics.” New Zealand Management, vol. 64, no. 5, June 2015, pp. 6–7. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=102872033&site=ehost-live&scope=site.
Ali, Rashid. “Looking to the Future of the Cyber Security Landscape.” Network Security, vol. 2021, no. 3, Mar. 2021, pp. 8–10. EBSCOhost, https://doi.org/10.1016/S1353-4858(21)00029-5.
Jindal, Hemlata. “Cyber Security Risk Management & Insurance.” Journal of the Insurance Institute of India, vol. 1, no. 4, Apr. 2014, pp. 95–102. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=96841319&site=ehost-live&scope=site.
Perez, Roi. “Cyber-Security Awareness.” SC Magazine: For IT Security Professionals (UK Edition), Summer 2016, pp. 18–21. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=116714411&site=ehost-live&scope=site.