hy the first one is the assignment and the rest three are the work that i have done previously and i have also provided the sample for it please have a look and let me know
HOLMES INSTITUTE FACULTY OF HIGHER EDUCATION Page 2 of 3 Assessment Details and Submission Guidelines Trimester T2 2020 Unit Code HI6008 Unit Title Business Research Project Assessment Type Individual Assessment Title Assignment 4 - Reflective Journal Purpose of the assessment (with ULO Mapping) The purpose of this assessment is to ensure each student is able to individually document a critical reflection of their personal learning process, as experienced during this unit. Matches to Unit Learning Outcomes 1, 2, 3, 4, 6, 7 Weight 20 % of the total assessments Total Marks 20 Word limit At least 1200 words Due Date Friday of Week 12 S Submission Guidelines · All work must be submitted on Blackboard by 12 midnight on the due date, along with a completed Assignment Cover Page. [No cover page -20%] · The assignment must be in MS Word format, 1.5 spacing, 12-pt Arial font and 2 cm margins on all four sides of your page with appropriate section headings, paragraphing, and page numbers. · If applicable, any reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list, all using Harvard referencing style. · Include a statement indicating which sections of this research project (that you personally wrote) provided you with opportunities to learn about Business Research. Assignment 4 Specifications Purpose: This unit aims to give you an opportunity to combine many facets of your acquired MBA skills into the production of a high-quality research project. Assignment 4 - the Individual Reflective Journal - is to ensure each student is able to contribute to document a critical reflection of their personal learning process, as experienced during this unit. It will be best to build your journal progressively, by making notes each week, starting at week 1 and going through to week 12. Your notes will serve as a reminder of which sections you personally contributed to, what you learnt, and how you experienced the learning process. A significant aspect of the learning journal will be your reflections on how well your team co-operated in the various phases of the Business Research Project, i.e. Topic Approval, Literature Review, and Methodology. Assignment Structure should be as the following: 1. My personal contribution to the topic selection, problem definition, research question, writing of topic approval submission, and team charter. How I experienced this and what I learnt from it. 2. My personal contribution to the literature review report, i.e. search process, summarising of relevant articles, designing the outline/argument/structure of the literature review, writing up the literature review. How I experienced this and what I learnt from it. 3. My personal contribution to the research methodology report, i.e. my role in discussions about methods, sampling, questionnaire design, data collection, analysis and interpretation. How I experienced this and what I learnt from it. 4. My reflections on the research experience, insights I gained, and any issues, struggles, challenges, synergies I experienced, individually and in the teamwork. 5.Include a statement indicating which sections of this research project (that you personally wrote) provided you with opportunities to learn about Business Research. HI6008 Assignment 4 – Individual Reflective Journal - Marking Rubric Very Good 4 Good 3 Satisfactory 2 Poor 1 Unclear 0 Reflections about: topic identification, problem definition, research question, i.e. what you learnt whilst writing the topic approval submission and team charter [Max 4 marks] Deep, insightful, well-stated, comprehensive capturing of essential learnings, feelings and future opportunities Good attempt at capturing essential learnings, feelings and future opportunities Satisfactory attempt at capturing essential learnings, feelings and future opportunities Poor attempt at capturing essential learnings, feelings and future opportunities Insufficiently reflective or not communicated Reflections about: literature review, i.e. what you learnt while conducting the literature search process /summarising relevant articles/ designing the outline of the literature review/ writing up the literature review [Max 4 marks] Deep, insightful, well-stated, comprehensive capturing of essential learnings, feelings and future opportunities Very good attempt at capturing essential learnings, feelings and future opportunities Good attempt at capturing essential learnings, feelings and future opportunities Satisfactory attempt at capturing essential learnings, feelings and future opportunities Insufficiently reflective or poorly communicated Reflections about: methodology, i.e. what you learnt through discussions about methods/ sampling/questionnaire design/ data analysis and interpretation [Max 4 marks] Deep, insightful, well-stated, comprehensive capturing of essential learnings, feelings and future opportunities Very good attempt at capturing essential learnings, feelings and future opportunities Good attempt at capturing essential learnings, feelings and future opportunities Satisfactory attempt at capturing essential learnings, feelings and future opportunities Insufficiently reflective or poorly communicated Reflections about: the research experience, i.e. say what insights you gained, and any issues, struggles, challenges, synergies experienced, individually and in the teamwork [Max 4 marks] Deep, insightful, well-stated, comprehensive capturing of essential learnings, feelings and future opportunities Very good attempt at capturing essential learnings, feelings and future opportunities Good attempt at capturing essential learnings, feelings and future opportunities Satisfactory attempt at capturing essential learnings, feelings and future opportunities Insufficiently reflective or poorly communicated Your statement indicating which sections of this research project you personally wrote and how this experience provided you with opportunities to learn about Business Research [Max 4 marks] Evidence of a very good overall contribution Evidence of a good overall contribution Evidence of a satisfactory overall contribution Evidence suggests a poor overall contribution No evidence of personal contribution Total Marks (20) Comments: /20 HI6008 Business research Project – Assignment 4 – Reflective Journal HI6008 Business research Project – Assignment 4 – Reflective Journal HOLMES INSTITUTE OF FACULTY OF HIGHER EDUCATION A SYSTEMATIC REVIEW ON: THE CHALLENGES OF CYBER SECURITY FOR BUSINESS GROUP ASSISEMENT Contents Abstract3 Introduction4 Literature review5 Research Problems7 Research Question7 Abstract Being the hottest topic for today’s security issue in today’s environment, business organization are also facing the challenges of the cyber security. Business are upgrading towards technology for the efficient way in doing work and for the business as well as all the business wants to market their business to the people and Internet is the best platform to market and run business. Different attacks are performed using the Internet which disclose the information and privacy of the individual and an organization. Attacks and data breach are the main challenges of cyber security for today’s business organization if they are working online. There are new technologies being developed which assures more security then the todays advance encryption system and other system like block chain technology. The research focus on finding the challenges of cyber security in business and way to mitigate them. Knowing problem is not sufficient if the solution is not given. Introduction Companies’ infrastructure is using internet facilities for storing data, customer information, companies’ information and lot of information about companies. Success of any company depends on ability to protect its proprietary information and customer’s data from those who can misuse it (Soloviov & AlexanderDanilov, 2020). A series of protocols that an individual and company most follow to be sure about information which maintain “ICA”-integrity, confidentiality and availability this can be known as cybersecurity (Li, et al., 2018). Best cyber security infrastructure and manpower can be able to recover the data from power outages, errors or any hard drive failures and makes organization defendable to any external attacks. Cyber securities not only make the data secure but also protects from sophisticated criminals’ groups and ’script kiddies’ which may have capacity of using “Advanced President Threats” APTs. Continuous working is essential for business survival. Recovering from threats means business can gain businesses audience and customer trust during problematic situation? Business using digital programs they are vulnerable and open to attacks. Digitalization can bring opportunity for innovation and new ideas for business can be generated along with challenges also comes in a way (Mangat:, 2019). Digitalization is long time process to be secure ecosystem to regulate and control itself. Business decision maker are not 100% able to choose and implement latest high security systems. Basic cyber security protocol training should be given to employees which is just not performing in the organization which increase internal threats. Employees are not able to identify the virus’s emails and how to quarantine it, while giving notice to both internal and external authority. Bad results can be arising against decision maker frequent testing the right security strategy controls is to be tested even if the strongest controls are in place. Attackers are so smart they can find the small weak spots and knows how to exploit them, that may bring system down even stronger system is installed as you think. Good cyber hygiene or practicing the fundamental security tasks is the best solution that keeps majority of threats out (Sedjelmaci & Senouci, 2018). Any sophisticated hackers would avoid simple defenses best cyber securities strategies go well beyond the basics. Cyber securities also become more difficult as a company expands. For example, attack surface of a large-scale company is much larger than small or medium sized business. Business have many challenges of cyber securities not only from external but also from internal person. External persons like hackers will use your related information and customers detail for their beneficial but internal person can also misuse the data that are stored in internet. Literature review Cyber security is big challenges for business nowadays in securing the data and secret information. Peoples are using internet for good usage and some bad thinking person are misusing it so, good cyber security is most essential for business to secure their data and secrets about businesses (Kshetri, 2019). Complicated regulation system can be used in stored data to be opened. Latest security is available which is easier to use and very compactable to hack for outsider, such technologies should be used in company but due to the lack of regular network monitoring and staff illiteracy about the cyber security in organization. Challenges of cyber security in Business: Large attack opportunities for hackers: as devices and cars without drivers are becoming normal, internet of things (IOT) and BYOD business policies give criminals more space and access to cyber-physical systems. Cyber security is dealing with the increasing overlap between the physical and virtual worlds of information exchange (Tahsien, et al., April 7, 2020). Less effective rules and regulation: political discussions around customer policy will be complicating cybersecurity as they are unbale to track all the data breach and attacks. General Data Protection Regulation (GDPR) framework is implemented by European union by creating more hurdles for companies by making sure they can do business by not paying heavy fines (Goddard, 2012). Blockchain revolution: Being new technology, blockchain could bring revolution in cybersecurity issues problem solution but also takes time to understand use by global organization and individual. It is the digital medium for peer-to-peer value exchange, it is the technology which uses