03 Mar Based on attached documents please answer below?600 words Final Reflection Write a reflection about your journey in this course.
Based on attached documents please answer below 600 words
Final Reflection
Write a reflection about your journey in this course. In your reflection, give a detailed explanation about how you intend to start your data collection process {once you get the green light from IRB [if you do not have it already]}. Include the when, who, what, and how you intend to start this process.It is essential to have this game plan as a roadmap to keep you on task as you continue your work.
Informed Consent Form
I am conducting a study about Cyber Security. I invite you to participate in this research. You were selected as a participant because you were victim of breach of cyber security in the Twitter Spear Phishing and the Zoom credential hack companies. Please read this form and ask any questions you may have before consenting to be in the study.
This study is being conducted by: researcher :Prem chander Boinapally.
Background Information:
The purpose of this study is bring awareness of how cyber infiltrators have developed many ways of hacking into systems. In this day and era, cyber security helps maintain order, and keep the internet safe for users. The current digital era has influenced change in the ways we buy things, bills get paid, watch movies, how people pay mortgages and rent houses just to mention but a few. Incidents of security breaches are widely reported as well as fraud, malicious cyber-attacks, fraud, hacking, and cyber-bullying making it necessary for the need of cyber security.
Consent forms will be provided for minors, to be signed by their guardians indicating approval for conducting the research on minors. Experts also will have to sign a consent form indicating that they freely and willingly gave information to their best of their knowledge and without any bias whatsoever. Adults also will sign a consent stating the same that they willingly gave information free from coercion or biasness.
Procedures:
If you participate in this study, I will ask you to do the following things. Provide relevant information as provided for in the questionnaires or provide relevant answers when called or when an interviewer conduct the survey face to face. Information provided will remain confidential. You may ask questions of the researcher at any point in the study. Participants will require to fill in written questioners especially for the focus group and online through mail. Some other participants will be called by surveyors to collect the relevant information and will be asked questions also from the questionnaires. The focus groups will comprise of minors, their guardians, and affected members of cyber-attacks. The aim of the focus groups is to bring the people with the commonality of being cyber attacked together to shed light and give their personal perspectives on the cyber-attack research. Meetings will be conducted online and physically where groups will me in designated public spaces as promptly communicated through email. Participants especially those conducting the surveys will travel across the designated geographical areas of group meetings.
Risks and Benefits of Being in the Study:
The study has several risks. First, the victims may get traumatized and emotional. Second, big corporation may fire their employees for giving out information of breaches in their system not made public. Third, threats maybe issued by corporations who feel the need to bury this kind of information.
There is minimal risk of emotional discomfort if you choose to participate in this study and be recorded. If needed for support, resources can be reached at [email protected]. There is risk of being traumatized, fired and threatened by the corporations under review might be inevitable.
There are no immediate benefits to you for participating in this study.
The direct benefits of your participation are: awareness will be raised to help fight cyber security breaches. The consumer will gain awareness and be protected from cyber criminals. Consumers will get better know how of why and how these breaches occur. Businesses and organizations will know what measures to adopt to reduce cyber-attacks.
Confidentiality:
In any publications of the results, pseudonyms will be used in place of names of participants or locations. The records of this study will be kept private. In any sort of report I publish, I will not include information that will make it possible to identify you in any way. Research records will be kept secured; my Judson University research advisor and I are the only people who will have access to the records as well as video and audio recordings. No names will be noted down with the answers on questioners. The questioners won’t capture details of the participant filling it. After compilation and deduction of the research the questioners will be burnt.
Video Recordings
Video recordings for data analysis, and portions of recordings may be presented in a professional context. Although real names will not be used in presentations of the research, and responses will be treated with confidentiality to anyone outside of the project research staff, participants might be identifiable to people who recognize them in video recorded artifacts. Recordings will be kept until completion of study groups sessions, face to face interviews, telephone interviews, and online meetings through the designated platform and destroyed immediately thereafter after compilation of data collected. Please sign below if you are willing to have your image recorded. You may still participate in this study if you are not willing to have your image recorded. If you are not willing to be video recorded, the camera will be situated in the classroom at an angle that will avoid capturing your image. Any unintentional video recording(s) of you will be edited to blur their image, causing them to be unrecognizable to viewers.
___________________________ ______________
Signature Date
· Audio Recordings
Interviews may be audio recorded for data analysis, and portions of recordings may be presented in a professional context. Although real names will not be used in presentations of the research, and responses will be treated with confidentiality to anyone outside of the project research staff, participants might be identifiable to people who recognize them in audio recorded artifacts. Recordings will be kept until completion of degree and destroyed immediately thereafter. Please sign below if you are willing to have the interview(s) audio recorded. You may still participate in this study if you are not willing to have the interview(s) audio recorded.
__________________________ ___________
Signature Date
Voluntary Nature of the Study:
Your participation in this study is entirely voluntary. Your decision whether or not to participate will not affect your current or future relations with your employer or Judson University. If you decide to participate, you are free to withdraw from the study at any time without penalty. Should you decide to withdraw from the study, data collected about you, or your students will only be used up to the point of your withdrawal.
Contacts and Questions
My name is Prem chander Boinapally. You may ask any questions you have now and at any point through the research process. If you have questions, you may contact me at [email protected]. You can also contact my advisor Dr. Olabisi Adenekan email which is [email protected]. Or the Disaster Distress Helpline at 1-800-985-5990.
You will be given a copy of this form to keep for your records.
Statement of Consent:
I have read the above information. My questions have been answered to my satisfaction. I give consent to participate in the study.
___________________________ ________________
Printed Name of Participant Date
___________________________ ________________ Signature of Study Participant Date
__________________________ ________________ Signature of Researcher Date
,
JUDSON UNIVERSITY INSTITUTIONAL REVIEW BOARD
RISK ASSESSMENT FOR RESEARCH INVOLVING HUMAN SUBJECTS
This protocol must be approved by the Judson University Institutional Review Board before data are collected. Please refer to the Judson University IRB Procedures and Policies manual available at www.judsonu.edu/irb.
__________________________________________________________________________________________
Name: Prem chander Boinapally Date: 1/31/2022
__________________________________________________________________________________________
Program or Department: Adult and Continuing Education and Teaching
Supervising Professor: Dr.Olabisi Adenekan
__________________________________________________________________________________________
Title of Proposed Research: Cyber Security
Read the following Risk Level Assessment Form(next page) and mark all items in each risk category that apply to your research. Record the totals from each category below:
No risk: __2________ Minimum risk: __4_________
Moderate risk: __6________ High risk: __1_________
Be sure your IRB Application thoroughly describes the following:
If your research involves vulnerable populations, include the following in the IRB application.
1. If your subjects are MINORS: Describe how you will obtain each child’s verbal or written assent as well as written consent from the child’s legal guardian. Note: At ANY level of risk, informed consent must be obtained from both the parent or guardian AND the minor before data is collected. If consent is given by the minor, but not by the parent or guardian, data should not be collected. Describe the means to be taken to reduce risks and to safeguard the subjects. Describe why alternative, less risky methods of research would not be possible.
2. If your subjects are VULNERABLE TO “UNDUE INFLUENCE”: For example, anyone over whom you have authority or anyone in your care is vulnerable to your influence (students, clients, parishioners, employees, etc.). Describe how the subject’s right to decline participation without negative consequences will be preserved. Describe the means to be taken to reduce risks and to safeguard the subjects. Describe why alternative, less risky methods of research would not be possible.
3. Other “VULNERABLE POPULATIONS”: For example, those who are institutionalized or are unable to make their own decisions are vulnerable. Describe the vulnerability of the subjects and how the risk caused will be minimized. Describe actions to be taken to reduce risks and safeguard the subjects. Describe why alternative, less risky methods of research would not be possible.
If the Principal Investigator is a student:
Signature of supervising professor ________________________________________
Date ____________________________
RISK LEVEL ASSESSMENT FORM
This checklist is provided to help researchers, reviewers, and the IRB to consider thoroughly the research proposal in light of the potential risk to human subjects and does not in itself determine the decision or recommendations of the IRB. It is not the intent of the IRB to use this risk level assessment tool to comment on the merits, quality, or design of the research beyond the potential risks to human subjects.
Based on your research purpose, population, and methods, check all items in each category that apply to your research, and indicate the totals on p. 1. It is not uncommon for items to be checked in multiple categories, and it may take only one risk factor to place the entire research project in a particular category. You may be able to justify the value of a research project being at a particular risk level, or you might describe procedures that reduce the potential impact of an acknowledged risk factor in your IRB application.
NO RISK LEVEL CRITERIA:
____ People will be observed randomly in a public place where there is no personal identification of subjects.
____ Subjects are not aware of the observation and do not have direct contact with the researcher.
__X__ Only public information will be utilized, such as phonebooks, directories, or other widely published lists.
____ Data are collected without any identifying information. There is no possible or imaginable way to trace responses back to subjects.
__X__ Data will be used collectively in a statistical manner, and no one individual’s response can or will be tracked.
__2__ TOTAL for NO RISK
MINIMAL RISK LEVEL CRITERIA:
__X__ Subjects are interviewed or otherwise contacted to solicit participation.
__X__ Inquiries are made regarding to basic identifying information such as age, gender, ethnicity, etc.
__X_ Subjects are asked to answer general questions regarding non-personal information.
__X__ Subjects are asked to give opinions or attitudes toward commonplace matters such as general trends or other benign topics.
____ The research will not in any way influence or affect the subject socially, psychologically, or spiritually.
____ The collection of required information will not take more than 4-5 minutes of the subject’s time.
__4___ TOTAL for MINIMAL RISK
MODERATE RISK LEVEL CRITERIA:
__X__ The subject is asked to reveal personal information regarding individual opinions, background, behaviors, attitudes, or beliefs.
__X__ Subjects will be selected to participate based upon a particularly unique characteristic or group membership (similar position, training, background)
____ Subjects will be selected to participate based on an extraordinary life experience.
____ Topics or questions raised are politically, emotionally, culturally, spiritually, or psychologically sensitive.
__X_ Individual or group presentations, phone calls, or questionnaires will be used to solicit participation in the research.
__X__ The research objective is not revealed at the outset to the subject in a direct and straightforward manner, such as research that requires that the subject be naïve regarding the research in order to participate objectively.
__X__ Subjects are required to reflect on their own behavior, values, relationships, or self in such a way that one might be influenced or affected, and/or anxiety or concern might be raised about the subject matter of the research.
__X__ The subject may have regrets, concerns, afterthoughts, or reactions to the research method after data collection is completed.
___ The subject may become tired, weakened, or be mentally or physically affected as a result of the research method.
____ The research may inconvenience subjects by causing a delay or intrusion into their routine or schedule.
___ Involvement in the research will require more than 5 but less than 60 minutes of the subject’s time(outside of normal learning activities if the study is conducted in a classroom.)
__6__ TOTAL for MODERATE RISK
HIGH RISK LEVEL CRITERIA:
____ Subjects are asked or led to reveal highly personal information in areas such as close relationships, trauma, sexuality, or potentially immoral, unethical, or illegal acts.
____ The topic or research methodology will raise issues that are highly charged politically, emotionally, culturally, psychologically, socially, or spiritually.
__X__ The research will involve minors who do not have the authority and/or ability to give fully informed consent to participate.
____ The research will intentionally, or by design, involve persons who may be of legal age yet who are dependent on others due to a chronic or crisis health concern, developmental delays, advanced age, a language barrier, and/or incarceration, which may impair the subject’s ability to give fully informed consent.
____ Subjects will be selected to participate based upon a particular diagnosis, disorder, or physical or mental health concern.
____ The subject is likely to be affected emotionally, socially, or psychologically through the research over the short and/or long term, to the extent that debriefing or other reparative interventions are built into the research design (not solely for preventative purposes).
____ The research design calls for deception of the subject at any level.
____ The research involves physical manipulation, contact or touching either with the researcher or between subjects, physical exercise, and/or any medical procedure.
____ The research itself or the information obtained from the subjects may have immediate and/or long term political, legal, economic, and/or social consequences for the subjects.
____ Involvement in the research will require more than 60 minutes of the subject’s time(outside of normal learning activities if the study is conducted in a classroom.) or significantly influence the person’s routine and/or activities.
__1__ TOTAL for HIGH RISK
,
Principal Investigator: |
Prem chander Boinapally |
Study: |
Adult and Continuing Education and Teaching |
APPLICATION FOR APPROVAL OF RESEARCH
Institutional Review Board
Principal Investigator
1. Principal Investigator:
a. Full name: |
Prem chander Boinapally |
|
b. University department, program, and position: |
Education/Student |
|
c. Email address: |
||
d. Phone number: |
510-556-7011 |
b. Co-Principal Investigator (if applicable):
a. Full name: |
||
b. University department, program, and position: |
||
c. Email address: |
||
d. Phone number: |
c. Person completing this application (if not PI):
a. Full name: |
|
b. Email address: |
|
c. Phone number: |
d. If the PI is a student, the supervising professor or academic advisor:
a. Full name: |
Dr. Olabisi Adenekan |
b. Email address: |
|
c. Phone number: |
e. Has this study been approved by a committee?
f. |
Yes |
X |
No |
5. Submission Category (please check one):
Exempt – no human subjects involved |
X |
Expedite – minimal risk to human subjects |
Full Review – moderate to high risk to human subjects |
6. Publication Audience:
Internal – research intended for teaching purposes only within courses at Judson University. |
X |
Public – research may be published outside of Judson University. |
Research Study Identification and Overview
1. Title of study:
Cyber Security |
2. Full description of the research, its objectives, methods, and what subjects will be asked to do.
Our dependency on the internet has become immense. It is wrong to assume one’s safety in the sense that only big organizations are more susceptible to hackers. A normal consumer connected to the internet if not vigilant enough is at the risk of getting trapped easily. Cyber infiltrators have developed many ways of hacking into systems. In this day and era, cyber security helps maintain order, and keep the internet safe for users. The current digital era has influenced change in the ways we buy things, bills get paid, watch movies, how people pay mortgages and rent houses just to mention but a few. Incidents of security breaches are widely reported as well as fraud, malicious cyber-attacks, fraud, hacking, and cyber-bullying making it necessary for the need of cyber security. This research will use the qualitative research method. Data will be collected and analyzed. Non-numerical data will be used to help gather deeper insights into the problem to help generate new ideas. The intention is to investigate cyber security and find out possible measures put in place to be secure against threats, investigate the measures organization put in place and adopt for safety, and to find out what measures individuals and organizations should take to protect themselves. Deceptive practices will be avoided when designing the research at any time. The participants will remain anonymous and confidentiality will be upheld more concerning their identity and information they shared. Experts, and affected members that members who have suffered a cyber-attack were the targeted audience for survey. Measures have been adopted to avoid any kind of bias by making sure that the surveyors understand stereotyping more so as the foundation of bias and avoid it. Leaders are made responsible for transparent conducting of surveys where realistic expectations are set outlining clear criteria for the evaluation process of qualification and performance. Bias training to the surveyors was conducted and a means of making complaints from the targeted audience was set through way of email. Experts and cyber-attack victims being surveyed won’t be interviewed together. The victims will be interviewed together with other victims as these will be done in order to try and bring a safe space with commonality amongst the victims which will in turn enhance the information collection. I will travel to all four geographical locations to meet participants at their local geographical locations in order to attain efficiency as it would be hard for the participants to attend a synchronized meeting out of their local geographical locations. Data collected upon finalizing of the survey will be burnt. Focus group participants: Focus group meetings will be held in two distinct manners one through the phone and the other through face-to-face surveys. The focus will provide helpful insights in the research as there is multiple interaction, not only between the interviewee and participants, but among the participants themselves. Two rounds of face to face and physical focus group meetings were conducted with different groups. These focus groups consisted of 5-7 people including minors and their guardians. Victims and experts will not be in the same focus groups. Experts will interviewed separately with the data collected from the concluded focus group meetings. Data from network administrators is also reported. During the first focus group meeting participants were on the different way hackers get access to their networks and the different types of malwares. For the second focus group we gave data analysis of the first group and tried to reach a consensus of the most important deviations of the security rules. The focus that was conducted over the phone consisted of 5-7 members and lasted about one and a half hours. Minors were not part of these online focus group meetings as well as their guardians. The focus groups were audio taped and the audio tapes transcribed in anonymized text files. Adults with minors will be asked whether; · Online safety should be formalized within the education system? · Who should have the main responsibility for cyber safety? · What the main concern as a parent in relation to the children being online? · What challenges parents face in protecting their children? · What education should be given to parents? · What unique challenges are posed by cyber-bullying for parents, and what can be done for parents to monitor the children’s online activity? Analysis: The analysis of qualitative data is an iterative process. The coding of data comes first to determine major categories fit into different categories. Interpreting of qualitative data is highly subjective and procedures have to be developed to establish inter reliability. Two coders were used to code the data. They agreed to different categories and reached a consensus of how the data fitted into the main categories. After consensus, their solutions, and the data on which they were based, they were presented to another researcher. Based on the feedback of the other researcher changes were made of how the data fitted into the main categories. The same process continued and only after the three researchers came to a consensus about the right interpretation of the qualitative data, the solutions were accepted. Participation requirement: Subjects are asked to provide honest information for the survey. Participants will answer questions and provide insight on different questions asked. Minors involved will be required to ask for consent from their guardians where guardians will have to sign a formal consent form indicating that they agreed to the survey. The guardians will have to stay with the minors throughout the survey. All participants will converse in English. Group Component: groups will have 6-7 members brought together by a common characteristic. Meeting Preparation: Participants will be notified through emails of relevant information pertaining meetings especially. The participants will meet in meeting rooms, churches, classrooms more so after class activities have come to attend mostly in the evenings, where meetings will be held in backrooms in order to maintain confidentiality. Working logistics: each focus group members will determine accordingly to responses from the survey logistics. After meeting for one and a half hours, for two meetings, each group will be discontinued. Focus Group Meetings: A sign sheet will be provided for each meeting day to allow for the documentation of participants present. Only the initials and numbers assigned with every initial of the members names will be on the sign sheet. Name tags with initials and numbers will be given for easy identification. Relevant information will be communicated while making sure that the participants agree with the confidentiality agreement. The researcher will be the moderator and will take notes during the meeting. Different meetings will have different agendas. |
3. Dates for conducting study:
This study will take place between February and July 2022. General logistics; survey distribution, identifying participants will take place between February and March 2022. Focus group meeting will be done between April and May 2022. Transcription and coding will be done between April and July 2022. |
4. Site(s) of study:
The data to be collected will be collected from the following geographical areas: · Washington D.C area location. · Colorado Springs area location. · Albuquerque area location. · New York area location |
5. Description of the population/subjects participating in the research study, recruitment of the subjects, and the criteria for inclusion as a participant of the study.
The participants for this study will be of all ages and categorized as either an expert or a victim. The involvement selection process will be based on availability and willingness of the participants. A follow up survey will be conducted to people available and willing to participate in the research. Participant for this research study will be drawn from the mentioned geographical place above. Washington D.C will get higher popularity than the rest. Participants will be of mixed ages and gender. Participants who are victims take precedence as they provide insights of value to the research topic. For easier communication, participants will be able to converse in English. Participants will be of 5-7 participants who will be categorized by the geographical region they are in. |
6. Identification of special subjects/ populations, if any, such as children and minors, pregnant women, cognitively-impaired persons, prisoners, traumatized and comatose patients, terminally ill persons, elderly, minorities.
The research will be open to all ages and races with exception to children who need a guardian’s consent. The consent will be in writing signed executed by the guardians. |
7. Full description of provisions to care for subjects where there is risk of physical or emotional research-related harm.
When interviewing the victims, I’ll make sure they are in a safe space physically and psychologically to talk about how cyber security breach affected them. |
8. Description of confidentiality provisions and measures to protect the identity and privacy of subjects.
Any information given by participants Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline. Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax. Do you need help with this question? Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems. WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations. With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers. Chat with us today! We are always waiting to answer all your questions. |