Showing Page:
1/7
Running head: METHODOLOGY 1
Research Methodology
By Student’s Name
Course
Instructor
Institution
City/State
Date
Showing Page:
2/7
METHODOLOGY 2
Research Methodology
Primary Research Question
Does the nature of cyber security affect technological systems installed in businesses?
Secondary Research Questions
i. Since the designated systems are always connected to payment systems, they make a
good platform for cyber criminals to steal information. Does overreliance on designated
systems render payment systems vulnerable to cyber criminals?
ii. How safe is the point of sale from cyber criminals? What are the dangers of weak
securities of point of sale?
iii. Cybercriminals can use Cloud services to access powerful resources that they can use to
process and store data, appear, and disappear just at the click of a button. What are the
best ways of ensuring that cloud services are secure such that cyber criminals do not have
access to the powerful resources?
Research Design and Methodology
The research states a broad research problem that eventually is split into smaller
secondary question for easy and appropriate research study. The research design in this study
will mainly focus on the security of Point of Sale, cloud services, online payment systems that
are linked to designated systems among others. The validity of the study results is dependent on
the experimental research design. A sound and good experimental research design will be
followed in the study to collect relevant statistical data and assist in establishing excellent
scientific protocols. For this research study, control groups will not be possible therefore the
development of efficient and sound design phase is inevitable.
Data Collection
Showing Page:
3/7
METHODOLOGY 3
Research method can either be quantitative or qualitative. To establish the challenges of
the cyber crimes in the business, quantitative data is sourced from credible sources, analyzed and
results presented and interpreted thereof. For the research study, the target group will be business
men and women, bankers, and the users of online payment systems.
The data to be used on the study will be secondary data on the rate of cyber criminals
from the United States of America from 1998 to 2017. The secondary data used in the research
study will be grouped into cyber crimes resulting from the use of Point of sale services, loss of
information as a result f using cloud service, and use of online payment systems. The frequency
of the cyber crimes of the three groups will be used for analysis. The secondary data collected
will be tested for reliability and validity before the actual data analysis.
Mathematical Model
This section formulates a mathematical model for the rate of cyber crimes in the United
States of America. The researcher will focus on cyber crime data as from the yea 1996 to 2017.
Therefore the sample size in the study will be 21 years. The secondary data will then be retrieved
from CID department which is under the ministry of security. In this study, the number of cyber
criminals will be analyzed by the use multiple linear regression analysis and Monte-Carlo
simulation method to determine the relationship between the number of cyber crimes resulting
from the use of point of sale, online payment systems, and the quantity of data loss from cloud
service. In addition, descriptive statistical such as mean and variance will be calculated for each
category of cyber crime cases and pie charts drawn to represent the percentage of the total cyber
crime each category represents. The total number of the cyber crimes will be the response
variables while the Point of sale, point of sale, online payment systems, and the quantity of data
loss from cloud service cyber crime frequencies will be the explanatory variables in the research
Showing Page:
4/7
METHODOLOGY 4
study. The multiple regression model developed will aim at forecasting the number of future
cyber crimes.
Reliability and Validity Tests
Reliability refers to the consistency of test results (Yang&Wan, 2012, 37). Test results
accuracy enables one to make excellent and effective decisions. The level of reliability in
collected data was estimated using stability tests, internal reliability analysis, and equivalence
tests. During equivalence tests, a comparison of two equal data forms of changing variables was
done to estimate reliability level. Stability tests carried was carried to predict same results for a
given period of time. The reliability test was also carried to test for consistency of test results of
the data collected. If the data collected was found to be consistent then the researcher should
proceed with data analysis.
Validity is the extent to which collected data is interpreted appropriately (Ribes, Touahri
& Perthame, 2017, 17). Validity test determines how truthful the estimates are to the problem. If
the accuracy level is high, then data intensity of guaranteed. The intensity of data validity is
measured using three terms which include; high, moderate, and general valid data collection.
Content validity, construction of structural validity, and criteria and operational test validity are
the three type of validity that was measured in the study. The collected data was valid, and then
the interpretation of the analyzed data was true. Reliability and data validity tests are quite
important in determining consistency and truthful interpretation respectively. According to
(Yang&Wan, 2012, 837), data is reliable if and only if the measurement of collected data is
accurate.
Showing Page:
5/7
METHODOLOGY 5
Analysis of Results
In any research study, correct interpretation of the results of the data analysis is vital for
proper and viable conclusion and recommendations. The results of the fitted multiple regression
models will be based on the coefficients of the explanatory variables. The fitted regression model
will be of the form: Total cyber crimes = 𝛽
0
+ 𝛽
1
*Point of sale +𝛽
2
online payment systems
cyber crime + 𝛽
0
* data loss from cloud service use. Since the regression model will be
conducted at 0.05 significance level, the respective p-values of the explanatory variables will be
analyzed too. If the p-value of the explanatory variable is less than the significance level, then
the explanatory variable is said to be statistically significant else it is statistically insignificant.
Other factors to be considered in the analysis of the fitted regression model will correlation
coefficient or the coefficient of determination. If the values of both correlation coefficient and
coefficient of determination is either or close to 1, then there a conclusion that there exists a
strong relationship between response variable and explanatory variables is made.
Research Limitations
One of the main limitations of the research study is inadequate cyber crime data. Many
businesses which have lost data or their systems have been hacked by cyber criminals do not
report to the relevant authorities in fear of losing existing and potential customers. Most
customers are aware of the risks associated with information exposure to cyber criminals and
only transacts with the businesses they are confident that their systems are secure from cyber
criminals.
Research Plan
Day 1 :
Activity
Day 1
Research proposal
Showing Page:
6/7
METHODOLOGY 6
Day 2
Research proposal
Day 3
Research proposal
Day 4
Introduction to the research study
Day 5
Literature review
Day 6
Literature review
Day 7
Research design
Day 8
Retrieval of Secondary data
Data analysis
Day 9
Data interpretation and conclusion
Showing Page:
7/7
METHODOLOGY 7
Reference List
Ribes, E., Touahri, K., & Perthame, B. (2017). Employee turnover prediction and retention
policies design: a case study.
Yang, J., Wan, C., & Fu, Y. (2012). Qualitative examination of employee turnover and retention
strategies in international tourist hotels in Taiwan. International Journal Of Hospitality
Management, (3), 837

Unformatted Attachment Preview

Running head: METHODOLOGY 1 Research Methodology By Student’s Name Course Instructor Institution City/State Date METHODOLOGY 2 Research Methodology Primary Research Question Does the nature of cyber security affect technological systems installed in businesses? Secondary Research Questions i. Since the designated systems are always connected to payment systems, they make a good platform for cyber criminals to steal information. Does overreliance on designated systems render payment systems vulnerable to cyber criminals? ii. How safe is the point of sale from cyber criminals? What are the dangers of weak securities of point of sale? iii. Cybercriminals can use Cloud services to access powerful resources that they can use to process and store data, appear, and disappear just at the click of a button. What are the best ways of ensuring that cloud services are secure such that cyber criminals do not have access to the powerful resources? Research Design and Methodology The research states a broad research problem that eventually is split into smaller secondary question for easy and appropriate research study. The research design in this study will mainly focus on the security of Point of Sale, cloud services, online payment systems that are linked to designated systems among others. The validity of the study results is dependent on the experimental research design. A sound and good experimental research design will be followed in the study to collect relevant statistical data and assist in establishing excellent scientific protocols. For this research study, control groups will not be possible therefore the development of efficient and sound design phase is inevitable. Data Collection METHODOLOGY 3 Research method can either be quantitative or qualitative. To establish the challenges of the cyber crimes in the business, quantitative data is sourced from credible sources, analyzed and results presented and interpreted thereof. For the research study, the target group will be business men and women, bankers, and the users of online payment systems. The data to be used on the study will be secondary data on the rate of cyber criminals from the United States of America from 1998 to 2017. The secondary data used in the research study will be grouped into cyber crimes resulting from the use of Point of sale services, loss of information as a result f using cloud service, and use of online payment systems. The frequency of the cyber crimes of the three groups will be used for analysis. The secondary data collected will be tested for reliability and validity before the actual data analysis. Mathematical Model This section formulates a mathematical model for the rate of cyber crimes in the United States of America. The researcher will focus on cyber crime data as from the yea 1996 to 2017. Therefore the sample size in the study will be 21 years. The secondary data will then be retrieved from CID department which is under the ministry of security. In this study, the number of cyber criminals will be analyzed by the use multiple linear regression analysis and Monte-Carlo simulation method to determine the relationship between the number of cyber crimes resulting from the use of point of sale, online payment systems, and the quantity of data loss from cloud service. In addition, descriptive statistical such as mean and variance will be calculated for each category of cyber crime cases and pie charts drawn to represent the percentage of the total cyber crime each category represents. The total number of the cyber crimes will be the response variables while the Point of sale, point of sale, online payment systems, and the quantity of data loss from cloud service cyber crime frequencies will be the explanatory variables in the research METHODOLOGY 4 study. The multiple regression model developed will aim at forecasting the number of future cyber crimes. Reliability and Validity Tests Reliability refers to the consistency of test results (Yang&Wan, 2012, 37). Test results accuracy enables one to make excellent and effective decisions. The level of reliability in collected data was estimated using stability tests, internal reliability analysis, and equivalence tests. During equivalence tests, a comparison of two equal data forms of changing variables was done to estimate reliability level. Stability tests carried was carried to predict same results for a given period of time. The reliability test was also carried to test for consistency of test results of the data collected. If the data collected was found to be consistent then the researcher should proceed with data analysis. Validity is the extent to which collected data is interpreted appropriately (Ribes, Touahri & Perthame, 2017, 17). Validity test determines how truthful the estimates are to the problem. If the accuracy level is high, then data intensity of guaranteed. The intensity of data validity is measured using three terms which include; high, moderate, and general valid data collection. Content validity, construction of structural validity, and criteria and operational test validity are the three type of validity that was measured in the study. The collected data was valid, and then the interpretation of the analyzed data was true. Reliability and data validity tests are quite important in determining consistency and truthful interpretation respectively. According to (Yang&Wan, 2012, 837), data is reliable if and only if the measurement of collected data is accurate. METHODOLOGY 5 Analysis of Results In any research study, correct interpretation of the results of the data analysis is vital for proper and viable conclusion and recommendations. The results of the fitted multiple regression models will be based on the coefficients of the explanatory variables. The fitted regression model will be of the form: Total cyber crimes = 𝛽0 + 𝛽1 *Point of sale +𝛽2 ∗ online payment systems cyber crime + 𝛽0 * data loss from cloud service use. Since the regression model will be conducted at 0.05 significance level, the respective p-values of the explanatory variables will be analyzed too. If the p-value of the explanatory variable is less than the significance level, then the explanatory variable is said to be statistically significant else it is statistically insignificant. Other factors to be considered in the analysis of the fitted regression model will correlation coefficient or the coefficient of determination. If the values of both correlation coefficient and coefficient of determination is either or close to 1, then there a conclusion that there exists a strong relationship between response variable and explanatory variables is made. Research Limitations One of the main limitations of the research study is inadequate cyber crime data. Many businesses which have lost data or their systems have been hacked by cyber criminals do not report to the relevant authorities in fear of losing existing and potential customers. Most customers are aware of the risks associated with information exposure to cyber criminals and only transacts with the businesses they are confident that their systems are secure from cyber criminals. Research Plan Day 1 : Activity Day 1 Research proposal METHODOLOGY 6 Day 2 Research proposal Day 3 Research proposal Day 4 Introduction to the research study Day 5 Literature review Day 6 Literature review Day 7 Research design Day 8 Retrieval of Secondary data Data analysis Day 9 Data interpretation and conclusion METHODOLOGY 7 Reference List Ribes, E., Touahri, K., & Perthame, B. (2017). Employee turnover prediction and retention policies design: a case study. Yang, J., Wan, C., & Fu, Y. (2012). Qualitative examination of employee turnover and retention strategies in international tourist hotels in Taiwan. International Journal Of Hospitality Management, (3), 837 Name: Description: ...
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4