StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security Proposal - Essay Example

Cite this document
Summary
Considering the mobile phone network provider will allow for the deeper understanding of the techniques used by the companies to overcome the problem of network down time and data protection. Also the privacy issues of the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Information Security Proposal
Read Text Preview

Extract of sample "Information Security Proposal"

Information Security Proposal Aim and Objectives of Project: To identify the issue faced by mobile phone network providers in regards to the privacy issues and the network downtime issues. Justification of the Project:Information Security issues within firms are many. Considering the mobile phone network provider will allow for the deeper understanding of the techniques used by the companies to overcome the problem of network down time and data protection. Also the privacy issues of the customers in relation to the mobile phones and information of the customer’s needs to be noted.

Being mobile phone users it is essential for us to understand how the company deals with the information security and the measures that are in place for the IT disaster recovery plan as well. This includes the recovery from network downtime. It also includes the plans and security in place for the Activities and Implementation Timeline:The research will contain a number of activities. The table provided below provides for the timeline for the implementation of the activities. .ActivitiesTimelineLiterature review3 weeksDeveloping questionnaires for both qualitative as well as quantitative research1 weekConducting interviews2-3 weeksCollecting responsesAnalyzing the responses2 weeksDrafting the Dissertation2 weeksResearch Methodology:A paradigm can have various meanings.

It refers to “your basic beliefs” and your approach to the world which affects the way you define your research and how you collect and analyse data (Collis & Hussey, 2003, p. 47). The research approaches used in the study comprises a mixture of both the “phenomenological paradigm” which is also referred to as a “qualitative” approach, and the “positivistic paradigm” also known as the “quantitative” approach (Collis & Hussey, 2003, p. 47). As the research will utilize interviews to collect data, it would be advantageous to use both the qualitative and quantitative approaches.

This will be useful when conducting interviews, as the phenomenological paradigm helps the researcher to “get a feel for the key issues” and provides “confidence” in the accuracy and depth of the data collected as the main issues have been covered (Saunders & Lewis & Thornhill, 2000, p. 98). Furthermore, working within the positivistic paradigm will assist in measuring the data and the correlation between the variables, and the quantitative research outcome could be measured against existing theory.

Using a mixture of approaches and techniques has advantages, as all methods have pros and cons. This means using a triangulation approach, which as Denzin & Lincoln (2000) explain “has been generally considered a process of using multiple perceptions to clarify meaning, verifying the repeatability of an observation or interpretation” (p. 443). Using both methods will help ensure that the research outcome is accurate and this “will lead to greater confidence being placed in your conclusions” (Saunders & Lewis & Thornhill, 2000, p. 99). It also reduces the “possibility of getting the answer wrong” (Saunders & Lewis & Thornhill, 2000, p. 100). For the research, data will be collected from two types of sources, which are primary and secondary (Sekaran, 2000, p. 221). This is referred to as “data triangulation, where data is collected at different times or from different sources in the study of a phenomenon” (Collis & Hussey, 2003, p. 78).BibliographyCollis, J.

& Hussey, R. (2003) Business Research: A practical guide for undergraduate and postgraduate students. 2nd edn. London: Macmillan Press Ltd.Denzin, N. K. & Lincoln, Y. S. (eds.) (2000) Handbook of Qualitative Research. 2nd edn. London: Sage Publications, Inc.Saunders, M. & Lewis, P. & Thornhill, A. (2000) Research Methods for Business Students. 2nd edn. Harlow: Pearson Education Limited.Sekaran, U. (2000) Research Methods for Business, A Skill-Building Approach. 3rd edn. New York: John Wiley & Sons Inc.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security Proposal Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Information Security Proposal Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1555737-information-security-proposal
(Information Security Proposal Essay Example | Topics and Well Written Essays - 500 Words)
Information Security Proposal Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1555737-information-security-proposal.
“Information Security Proposal Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1555737-information-security-proposal.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security Proposal

Information Security in Supply Chain Security

Ever since the supply chains have become technology dependent, the security aspect has faced significant impact from the ‘information security' aspect.... However, this ‘information security' aspect in the supply chain security is not as greatly investigated as the other areas are.... This research proposal is an attempt to provide a guideline regarding the research that will be conducted on the information security systems that are used by the agencies like customs in various countries....
4 Pages (1000 words) Research Proposal

Privacy-Enhancing Security Mechanisms

There exist many privacy enhancing security mechanisms that ensure secure delivery of data to the intended location.... In this paper, we will discuss the technique to design a reliable and efficient privacy-preserving scheme in order to ensure increased security of data over the network.... Problem Statement The problem statement for the research paper is: "Design and analysis of privacy-preserving network and cryptographic protocols" Conceptual Framework Aim of the Research In realistic networked environments, data security is the main focus of the management....
3 Pages (750 words) Research Proposal

The Negative Impacts of Cybercrime on Business and Society

This proposal will detail the reasons why cybercrime is a serious issue today and explore the basis for future research and study that will be conducted in this area.... nbsp; It can begin as something seemingly harmless, and rise to one of the gravest threats to personal and national security that exists today.... It can begin as something seemingly harmless, and rise to one of the gravest threats to personal and national security that exists today....
7 Pages (1750 words) Research Proposal

Gap between Requirements of Online Banking and Expectations of Consumers

1-14, 2007) indicate enormous increment in the number of users of online banking services that show alteration in the consumer behavior, and thus, banking institutions are continuing their updates, and at the same time, endeavoring to ensure security and safety of customer's money.... 440-445, 2006) believe that financial institutions are still incapable of providing 100% security to their customers.... Even marketing brochures and advertisement materials indicate high-level security; however, studies (Oyungerel, pp....
8 Pages (2000 words) Research Proposal

Information security risk assessment and mitigation strategies development

This research “information security risk assessment and mitigation strategies development” is focused on considering strategic steps of security management taken in case potential information hazards may occur.... hellip; The research question is the following: “How is it possible for any organization to improve and apply effective information security risk assessment and mitigation strategies”.... It brings in an innovative vision about the role of information security....
5 Pages (1250 words) Thesis Proposal

Balance between wireless security and performance

Although they have been accepted as convenient, the wireless… The wireless security systems have been scrutinized as being restricted in terms of performance.... Studies have indicated that eavesdropping is quite easier in the wireless security than in the Local Area Network.... The proposed topic for the research is “Improving the wireless network: achieving a balance between security and performance.... Although they have been accepted as convenient, the wireless systems have been under scrutiny about their level of security....
2 Pages (500 words) Thesis Proposal

The impact of mobile devices on Cyber Security

The proposed study "The impact of mobile devices on Cyber security" reveals the potential interaction between mobile devices and Cyber security.... The topic can be also related to the Criminal Justice in the following way: the violation of Cyber security has a series of legal consequences for the violator.... The proposed topic has been developed in the context of a research developed in regard to Cyber security.... As an aspect of the IT discipline, Cyber security is highly analyzed through existing literature....
4 Pages (1000 words) Research Proposal

Air Traffic Control Security before 9/11 and after 9/11

The paper also critically analyzes the proposal of the United States to allow drones to fly in its space and more so with passenger planes (Dennis Schaal, 2013).... "Air Traffic Control security before 9/11 and after 9/11" paper discusses the measures taken by the department of homeland security in ensuring that the air territory is well protected and avoid a repeat of the 9/11.... The paper proposes the security measures taken to prevent leakage of information....
11 Pages (2750 words) Thesis Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us