For this assignment, you must develop a data analysis strategy for your research study. You must then present your design in a presentation.
Your presentation should include the following:
- Title Slide
- Problem Statement
- Research Purpose
- Research Questions
- Definition of Key Terms
- Review of the Literature
- Validity of Research Topic
- Research Design
- Proposed Data Collection Strategy
- Proposed Data Analysis Strategy
- 150-200 words of speaker notes for each slide to assist with the delivery of the presentation
- Recording of your presentation of each slide using the recording feature in PowerPoint
Length: 13-slide presentation
References: Include a minimum of 6 scholarly resources. The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards,
Develop a Research Hypothesis 2
Threats to Cyber security and its Current Emerging Trends in Technology
TIM-7225 v4: Directed Quantitative Research
Dr. Ulrich Vouama
March 5, 2023
Problem Statement: Cyber security is an essential aspect of the digital world that protects the confidentiality, integrity, and availability of information and systems from unauthorized access, theft, and damage. Despite efforts to secure cyberspace, the cyber-attack threat continues to grow and evolve, leading to severe consequences for individuals, organizations, and nations.
Context and Problem: The increased number of connected devices and the growing reliance on technology has made cyber security a critical concern. A study conducted by Cybersecurity Ventures estimated that the cost of cybercrime would reach an annual figure of $6 trillion by the year 2021 (Cybersecurity Ventures, 2017). Moreover, the frequency and sophistication of cyber-attacks have increased, with many data breaches reported in the past few years. Cyberattacks on businesses have increased due to enterprises' internet use (CSO, n.d).
Negative Consequences: Cyber-attacks can range from financial losses, legal liability, reputational damage, loss of confidential information, and disruption of critical infrastructure. As an illustration, a data breach can result in the compromise of confidential information, such as personal and financial details, which can then lead to issues like identity theft, deception, and a decline in trust. Organizations may also face legal consequences, such as lawsuits, regulatory fines, and compensation claims.
Gap in Literature: Although the threat of cyber-attacks and their consequences have been widely researched, there is still a gap in the literature regarding the current emerging trends in technology and their impact on cyber security. The existing research primarily focuses on identifying and mitigating cyber threats. However, there is a need for an in-depth analysis of the current trends and their potential impact on the future of cyber security (Rajasekharaiah et al., 2020).
Purpose Statement: The purpose of this qualitative study is to examine the current threats to cyber security and the emerging trends in technology. A qualitative research method will be used to gather data through in-depth interviews and document analysis of relevant literature and primary sources. The goal of this study is to identify and understand the current threats to cyber security and how technology is affecting these threats (Kaur & Ramkumar, 2021). The participants in this study will be experts in the field of cyber security, including security professionals, researchers, and academics. The research location for this study will be conducted online and in academic institutions, as well as other relevant organizations involved in cyber security. The gap in the literature that this study aims to fill is a lack of understanding of the current threats to cyber security and the ways in which technology is affecting these threats. Through this study, we aim to contribute to the body of knowledge in the field of cyber security and provide insights into the current state of the industry, as well as the potential implications for future developments. This study will provide valuable information for organizations, individuals, and policymakers, in order to enhance cyber security measures and prepare for potential future threats.
Develop Research Questions
1. How can the identification and analysis of emerging technological trends be used to predict and mitigate potential cyber security threats?
2. How have cyber attackers evolved in their methods, and what are the implications of such evolution for cyber security?
3. What are the most effective measures that individuals and organizations can implement to mitigate the threat of cyber-attacks?
4. In what ways can policy and regulation be improved to enhance cyber security at the individual, organizational, and national levels?
5. What are the ethical considerations surrounding cyber security and emerging technologies, and how can they be addressed to ensure responsible innovation and use of technology?
Hypothesis: The purpose of this study is to examine whether there is a significant relationship between the level of cyber security threats and the frequency of cyber-attacks. The null hypothesis is that there is no significant relationship between the level of cyber security threats and the frequency of cyber-attacks, while the alternative hypothesis is that there is a significant relationship between the two variables.
Dataset: The ideal dataset for this study would include a sample of individuals or organizations that have experienced cyber-attacks. Each data point would consist of two variables: the level of cyber security threats faced by the individual or organization, measured on a scale of 1 to 10, and the frequency of cyber-attacks experienced over a specified period, measured as the number of attacks per week or month. Distinguishing between two samples would involve comparing the level of cyber security threats and frequency of cyber-attacks between two different groups, such as individuals or organizations that have implemented specific cyber security measures and those that have not (Wortman & Chandy, 2020).
Feasibility: Collecting this dataset would involve accessing data from various sources, such as cyber security reports and surveys, interviews with individuals or organizations that have experienced cyber-attacks, and online databases. The dataset could be collected ethically by ensuring that all data is anonymized, and all individuals or organizations involved in the study provide informed consent (Nagahawatta & Warren, 2020). However, collecting this dataset could be challenging as it may require significant resources, both in terms of time and funding.
Statistical Test: To test the hypothesis, we would use a Pearson correlation coefficient test to determine whether there is a significant correlation between the level of cyber security threats and the frequency of cyber-attacks. We would use a significance level of 0.05, which is a common level used in statistical analysis. This test would be appropriate because it measures the strength and direction of the linear relationship between two variables, making it an ideal method for determining the relationship between the level of cyber security threats and the frequency of cyber-attacks.
CSO Online. (n.d.). The biggest data breaches of the 21st century. Retrieved from https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html
Cybersecurity Ventures. (2017). Annual cybercrime report. Retrieved from https://cybersecurityventures.com/annual-cybercrime-report-2017/
Kaur, J., & Ramkumar, K. R. (2021). The recent trends in cyber security: A review. Journal of King Saud University-Computer and Information Sciences.
Nagahawatta, R., & Warren, M. (2020). Code of Ethical Practice and Cyber Security of Cloud Context: A Study Perspective of IT Authorities in SMEs. In Conference of the Australasian Institute of Computer Ethics (pp. 18-27).
Rajasekharaiah, K. M., Dule, C. S., & Sudarshan, E. (2020). Cyber security challenges and its emerging trends on latest technologies. In IOP Conference Series: Materials Science and Engineering (Vol. 981, No. 2, p. 022062). IOP Publishing.
Wortman, P. A., & Chandy, J. A. (2020). SMART: security model adversarial risk-based tool for systems security design evaluation. Journal of Cybersecurity, 6(1), tyaa003.