AIBI Information Security Risk Management in Small Scale Organizations Research

User Generated

Fvaquh05

Writing

Access International Business Institute

Description

You will review both quantitative and qualitative research. The topic is up to you as long as you choose a peer-reviewed, academic research piece. I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there. Consider also that leadership is a major component of this program, so your topic should at least in part have that as a focus. There are no hard word counts or page requirements as long as you cover the basic guidelines. You must submit original work, however, and a paper that returns as a large percentage of copy/paste to other sources will not be accepted. (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.)

Please use APA formatting and include the following information:

  • Introduction/Background: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology: Describe how the data was gathered and analyzed. What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results: What were the major findings from the study? Were there any limitations?
  • Conclusions: Evaluate the article in terms of significance, research methods, readability and the implications of the results. Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)
  • References

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Outline
Qualitative and Quantitative Research
I.

Information Security Risk Management In Small-Scale Organization


Introduction
Threats in computerized information systems have been considered an issue that
affects most organizations, which exposes them to various security risks.



Methodology
The study aimed to collect data to monitor everyday activities within the schools
and their engagement in computer systems use.



Findings and Results
The study's major findings indicated that the critical assets used by learners and
teachers were at a high risk of information insecurity.



Conclusions
This article applied a qualitative research method that looked at coming up with
guidelines that can be applied in secondary schools to improve the security
systems.

II.

Shaping Information Security Behaviors Related to Social Engineering Attacks


Introduction
The research article focuses on how most companies are affected by the lack of
proper utilization of information technology.



Methodology
Data was gathered by distributing surveys to the executives who were in charge of
information security.



Findings and Results
The research indicated that some of the factors that influence employee resilience
are trust, information security awareness, knowledge on computer and security,
intention, and target-related information.



Conclusions
The article explained attitude and intention as essential elements that determine an
individual’s behavior.


Running head: QUALITATIVE AND QUANTITATIVE RESEARCH

Qualitative and Quantitative Research
Student’s Name
Institutional Affiliation

1

QUALITATIVE AND QUANTITATIVE RESEARCH

2

Qualitative Research
Information security risk management in small-scale organizations: A case study of
secondary schools computerized information systems
Introduction
Threats in computerized information systems have been considered an issue that affects
most organizations, which exposes them to various security risks. The author looks at how
secondary schools have been affected by...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags