Description
- Watch the video from Week 10 Results, Discussion Conclusion chapters.
- Write a research discussion paper for your research.
The paper must include:
- A discussion and evaluation of the conflicting results
- A discussion of the unexpected findings
- A discussion on how the findings answer your research questions, address the hypotheses or propositions
- An explanation of the implication of your findings (why they are important and how they affect our understanding of the research problem).
The paper must following the formatting guidelines in The Publication Manual of the American Psychological Association (2010), (6th ed., 7th printing), and contain scholarly references. In addition, the paper will be submitted through the Turnitin originality-checking tool.
Explanation & Answer
Attached.
1
Running head: DATA BREACH
Data Breach
Student’s Name
Institutional Affiliation
2
DATA BREACH
Measures to Prevent Data Breach in Identity Theft
Discussion and Evaluation of the Conflicting Results
The conflicting results on the findings were on the fact that its occurrence characterizes
data breach. It is an idea that relates from the data collected within the organizations that have
experienced data breach over recent years. Here, it considers cyber-attack as an issue that occurs
as a result of external factors within the IT departments. Analyzing the patterns of the occurrence
of these breaches make it clear that the running of the organization causes most of these cases. It
also exists depending on the IT departments and how it is managed. The results, in this case, are
conflicting as it focuses on analyzing how data leaks take place by looking at its occurrence. The
conflicting results apply in analyzing the internal factors that threaten the performance of an
organization.
According to the research, it was also evident that cases of data breach have also been on
the rise due to internal factors. The initial finding emphasizes the need to look at the external
factors which are considered responsible for data leaks. The analysis calls for the need to have
firms adapt to measures that can be used to refill the gaps present. This assumption is a
conflicting result that requires organizations to look unto the issue of identity theft with much
emphasis on the overall factors. It is evident that the primary cause of its occurrence cannot only
be determined by working on either the internal and external factors. Data breach in identity theft
acr...
Review
Review
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!