Cyberattacks on Small Businesses

As I read the instructions for the proposed study, I did not have any questions. The instructions are straightforward, and following them in chronological order should not be a problem. I think it is beneficial that weeks 11 through 13 will be discussions to help build our research for the proposal.

The most challenging aspect I found in the instructions is solidifying the literature review. To find this literature review section, go to the “Elements to Include” section. Then the literature review should be listed as the second part of the section to complete. There are several requirements in the literature review section. One complex condition is that I have to provide the project’s potential limitations. The other condition is to include different perspectives to show that I have conducted thorough research. I know that these requirements will take time to work on and create a solid literature review.

I want to conduct quantitative research on why small businesses are vulnerable to cyberattacks. I have read a few sources about small businesses being a primary target for hackers, which needs to be solved. I would utilize surveys similar to the researchers in my article review. Choosing the topic to do the project over and conducting the research are the most enjoyable aspects.

About Peyton Rohan

I graduated from Eastland High School in the year 2020. Throughout High School, I have always been on the A honor roll. Throughout High School, I played a variety of sports such as basketball, football, golf, and track. My greatest interest was watching and playing basketball. I started my attendances at Fort Hays State University during the fall of 2020 and have been on the Dean's Honor Roll for the past two semesters. I now plan on graduating from Fort Hays State University during the year 2023 with a Bachelor of Computer Networking and Telecommunications degree that mainly focuses on Cybersecurity. I would say throughout the years of my education is that I am a persistent and hard worker, who gets assignments and projects done.

One thought on “Cyberattacks on Small Businesses

  1. Sounds like you have a good, strong area. You could even use the general research on vulnerability to cyberattacks to propose a study on how that applies to, for example, businesses in the local Chamber of Commerce or one specific business.

Leave a Reply

Your email address will not be published. Required fields are marked *