Research Proposal Outline and Flowchart for Cyber security in Businesses

HYPOTHESIS:  Understanding viruses and the dangers of hacker attacks in enterprises, as well as the importance of data security.

 

PROPOSAL OUTLINE:

Introduction- A brief overview of the present condition of cyber-attacks affecting businesses all around the world. Knowledge about the types of cyber-attacks that are occurring in the commercial world. Discuss the research proposal aims to identify a correlation among companies that have been breached in the past.

  • Why do cyberattacks happen to businesses
    • Norman 2019
    • Hellwag 2017
    • King 2017
  • Importance of having cyber security
    • Ali 2021
    • Jindal 2014
    • Perez 2016
  • How to prevent cyber attacks from happening
    • Werner 2017
    • Thibodeau 2007
    • N. Zealand MGMT 2015

 

Methodology:

  • Look for 5-10 companies that lack cybersecurity within there business
  • take the results of how many cyber attacks happened
  • split companies into two groups
  • half with cyber security, and have without
  • results on how businesses improved and how many attacks happened

 

 

References:

Veasey, E.Norman. “Protection of Client Confidential Information from Cyberattacks Is a Compelling Business and Ethical Priority for Inside and Outside Corporate Counsel.” Business Lawyer, vol. 75, no. 1, Winter2019/2020 2019, pp. 1495–517. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=141377239&site=ehost-live&scope=site.

Werner, Randy R. “How to Protect Against Common Cyberattacks and Insure Against Potential Losses. (Cover Story).” CPA Journal, vol. 87, no. 3, Mar. 2017, pp. 16–21. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=121733191&site=ehost-live&scope=site.

HELLWIG, BASIA. “Cyberattacks on Small Businesses Can Be Costly.” Dance Retailer News, vol. 16, no. 12, Dec. 2017, p. 6. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=126353274&site=ehost-live&scope=site.

KING, PAM. “Small Businesses Can Brace for Cyberattacks.” Wyoming Business Report, vol. 18, no. 7, Oct. 2017, pp. 3–11. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=125823147&site=ehost-live&scope=site.

Thibodeau, Patrick. “Feds Hope to Boost Businesses’ Role in Slowing Cyberattacks.” Computerworld, vol. 41, no. 10, Mar. 2007, p. 16. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=24283191&site=ehost-live&scope=site.

“Deceptive New Cyber-Attack Tactics.” New Zealand Management, vol. 64, no. 5, June 2015, pp. 6–7. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=102872033&site=ehost-live&scope=site.

Ali, Rashid. “Looking to the Future of the Cyber Security Landscape.” Network Security, vol. 2021, no. 3, Mar. 2021, pp. 8–10. EBSCOhost, https://doi.org/10.1016/S1353-4858(21)00029-5.

Jindal, Hemlata. “Cyber Security Risk Management & Insurance.” Journal of the Insurance Institute of India, vol. 1, no. 4, Apr. 2014, pp. 95–102. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=96841319&site=ehost-live&scope=site.

Perez, Roi. “Cyber-Security Awareness.” SC Magazine: For IT Security Professionals (UK Edition), Summer 2016, pp. 18–21. EBSCOhost, https://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=116714411&site=ehost-live&scope=site.

Leave a Reply

Your email address will not be published. Required fields are marked *