08 Mar For this assignment, you must develop a data analysis strategy for your research study. You must then present your design in a ?presentation. Your presentation should include
For this assignment, you must develop a data analysis strategy for your research study. You must then present your design in a presentation.
Your presentation should include the following:
- Title Slide
- Problem Statement
- Research Purpose
- Research Questions
- Definition of Key Terms
- Review of the Literature
- Validity of Research Topic
- Research Design
- Proposed Data Collection Strategy
- Proposed Data Analysis Strategy
- 150-200 words of speaker notes for each slide to assist with the delivery of the presentation
- Recording of your presentation of each slide using the recording feature in PowerPoint
Length: 13-slide presentation
References: Include a minimum of 6 scholarly resources. The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards,
Develop a Research Hypothesis 2
Threats to Cyber security and its Current Emerging Trends in Technology
TIM-7225 v4: Directed Quantitative Research
Dr. Ulrich Vouama
March 5, 2023
Problem Statement: Cyber security is an essential aspect of the digital world that protects the confidentiality, integrity, and availability of information and systems from unauthorized access, theft, and damage. Despite efforts to secure cyberspace, the cyber-attack threat continues to grow and evolve, leading to severe consequences for individuals, organizations, and nations.
Context and Problem: The increased number of connected devices and the growing reliance on technology has made cyber security a critical concern. A study conducted by Cybersecurity Ventures estimated that the cost of cybercrime would reach an annual figure of $6 trillion by the year 2021 (Cybersecurity Ventures, 2017). Moreover, the frequency and sophistication of cyber-attacks have increased, with many data breaches reported in the past few years. Cyberattacks on businesses have increased due to enterprises' internet use (CSO, n.d).
Negative Consequences: Cyber-attacks can range from financial losses, legal liability, reputational damage, loss of confidential information, and disruption of critical infrastructure. As an illustration, a data breach can result in the compromise of confidential information, such as personal and financial details, which can then lead to issues like identity theft, deception, and a decline in trust. Organizations may also face legal consequences, such as lawsuits, regulatory fines, and compensation claims.
Gap in Literature: Although the threat of cyber-attacks and their consequences have been widely researched, there is still a gap in the literature regarding the current emerging trends in technology and their impact on cyber security. The existing research primarily focuses on identifying and mitigating cyber threats. However, there is a need for an in-depth analysis of the current trends and their potential impact on the future of cyber security (Rajasekharaiah et al., 2020).
Purpose Statement: The purpose of this qualitative study is to examine the current threats to cyber security and the emerging trends in technology. A qualitative research method will be used to gather data through in-depth interviews and document analysis of relevant literature and primary sources. The goal of this study is to identify and understand the current threats to cyber security and how technology is affecting these threats (Kaur & Ramkumar, 2021). The participants in this study will be experts in the field of cyber security, including security professionals, researchers, and academics. The research location for this study will be conducted online and in academic institutions, as well as other relevant organizations involved in cyber security. The gap in the literature that this study aims to fill is a lack of understanding of the current threats to cyber security and the ways in which technology is affecting these threats. Through this study, we aim to contribute to the body of knowledge in the field of cyber security and provide insights into the current state of the industry, as well as the potential implications for future developments. This study will provide valuable information for organizations, individuals, and policymakers, in order to enhance cyber security measures and prepare for potential future threats.
Develop Research Questions
1. How can the identification and analysis of emerging technological trends be used to predict and mitigate potential cyber security threats?
2. How have cyber attackers evolved in their methods, and what are the implications of such evolution for cyber security?
3. What are the most effective measures that individuals and organizations can implement to mitigate the threat of cyber-attacks?
4. In what ways can policy and regulation be improved to enhance cyber security at the individual, organizational, and national levels?
5. What are the ethical considerations surrounding cyber security and emerging technologies, and how can they be addressed to ensure responsible innovation and use of technology?
Hypothesis: The purpose of this study is to examine whether there is a significant relationship between the level of cyber security threats and the frequency of cyber-attacks. The null hypothesis is that there is no significant relationship between the level of cyber security threats and the frequency of cyber-attacks, while the alternative hypothesis is that there is a significant relationship between the two variables.
Dataset: The ideal dataset for this study would include a sample of individuals or organizations that have experienced cyber-attacks. Each data point would consist of two variables: the level of cyber security threats faced by the individual or organization, measured on a scale of 1 to 10, and the frequency of cyber-attacks experienced over a specified period, measured as the number of attacks per week or month. Distinguishing between two samples would involve comparing the level of cyber security threats and frequency of cyber-attacks between two different groups, such as individuals or organizations that have implemented specific cyber security measures and those that have not (Wortman & Chandy, 2020).
Feasibility: Collecting this dataset would involve accessing data from various sources, such as cyber security reports and surveys, interviews with individuals or organizations that have experienced cyber-attacks, and online databases. The dataset could be collected ethically by ensuring that all data is anonymized, and all individuals or organizations involved in the study provide informed consent (Nagahawatta & Warren, 2020). However, collecting this dataset could be challenging as it may require significant resources, both in terms of time and funding.
Statistical Test: To test the hypothesis, we would use a Pearson correlation coefficient test to determine whether there is a significant correlation between the level of cyber security threats and the frequency of cyber-attacks. We would use a significance level of 0.05, which is a common level used in statistical analysis. This test would be appropriate because it measures the strength and direction of the linear relationship between two variables, making it an ideal method for determining the relationship between the level of cyber security threats and the frequency of cyber-attacks.
CSO Online. (n.d.). The biggest data breaches of the 21st century. Retrieved from https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html
Cybersecurity Ventures. (2017). Annual cybercrime report. Retrieved from https://cybersecurityventures.com/annual-cybercrime-report-2017/
Kaur, J., & Ramkumar, K. R. (2021). The recent trends in cyber security: A review. Journal of King Saud University-Computer and Information Sciences.
Nagahawatta, R., & Warren, M. (2020). Code of Ethical Practice and Cyber Security of Cloud Context: A Study Perspective of IT Authorities in SMEs. In Conference of the Australasian Institute of Computer Ethics (pp. 18-27).
Rajasekharaiah, K. M., Dule, C. S., & Sudarshan, E. (2020). Cyber security challenges and its emerging trends on latest technologies. In IOP Conference Series: Materials Science and Engineering (Vol. 981, No. 2, p. 022062). IOP Publishing.
Wortman, P. A., & Chandy, J. A. (2020). SMART: security model adversarial risk-based tool for systems security design evaluation. Journal of Cybersecurity, 6(1), tyaa003.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
Do you need help with this question?
Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.
WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.
With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Chat with us today! We are always waiting to answer all your questions.