HOLMES INSTITUTE FACULTY OF HIGHER EDUCATION Page 2 of 3 Assessment Details and Submission Guidelines Trimester T2 2020 Unit Code HI6008 Unit Title Business Research Project Assessment Type Individual...

1 answer below »
hy the first one is the assignment and the rest three are the work that i have done previously and i have also provided the sample for it please have a look and let me know


HOLMES INSTITUTE FACULTY OF HIGHER EDUCATION Page 2 of 3 Assessment Details and Submission Guidelines Trimester T2 2020 Unit Code HI6008 Unit Title Business Research Project Assessment Type Individual Assessment Title Assignment 4 - Reflective Journal Purpose of the assessment (with ULO Mapping) The purpose of this assessment is to ensure each student is able to individually document a critical reflection of their personal learning process, as experienced during this unit. Matches to Unit Learning Outcomes 1, 2, 3, 4, 6, 7 Weight 20 % of the total assessments Total Marks 20 Word limit At least 1200 words Due Date Friday of Week 12 S Submission Guidelines · All work must be submitted on Blackboard by 12 midnight on the due date, along with a completed Assignment Cover Page. [No cover page -20%] · The assignment must be in MS Word format, 1.5 spacing, 12-pt Arial font and 2 cm margins on all four sides of your page with appropriate section headings, paragraphing, and page numbers. · If applicable, any reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list, all using Harvard referencing style. · Include a statement indicating which sections of this research project (that you personally wrote) provided you with opportunities to learn about Business Research. Assignment 4 Specifications Purpose: This unit aims to give you an opportunity to combine many facets of your acquired MBA skills into the production of a high-quality research project. Assignment 4 - the Individual Reflective Journal - is to ensure each student is able to contribute to document a critical reflection of their personal learning process, as experienced during this unit. It will be best to build your journal progressively, by making notes each week, starting at week 1 and going through to week 12. Your notes will serve as a reminder of which sections you personally contributed to, what you learnt, and how you experienced the learning process. A significant aspect of the learning journal will be your reflections on how well your team co-operated in the various phases of the Business Research Project, i.e. Topic Approval, Literature Review, and Methodology. Assignment Structure should be as the following: 1. My personal contribution to the topic selection, problem definition, research question, writing of topic approval submission, and team charter. How I experienced this and what I learnt from it. 2. My personal contribution to the literature review report, i.e. search process, summarising of relevant articles, designing the outline/argument/structure of the literature review, writing up the literature review. How I experienced this and what I learnt from it. 3. My personal contribution to the research methodology report, i.e. my role in discussions about methods, sampling, questionnaire design, data collection, analysis and interpretation. How I experienced this and what I learnt from it. 4. My reflections on the research experience, insights I gained, and any issues, struggles, challenges, synergies I experienced, individually and in the teamwork. 5.Include a statement indicating which sections of this research project (that you personally wrote) provided you with opportunities to learn about Business Research. HI6008 Assignment 4 – Individual Reflective Journal - Marking Rubric Very Good 4 Good 3 Satisfactory 2 Poor 1 Unclear 0 Reflections about: topic identification, problem definition, research question, i.e. what you learnt whilst writing the topic approval submission and team charter [Max 4 marks] Deep, insightful, well-stated, comprehensive capturing of essential learnings, feelings and future opportunities Good attempt at capturing essential learnings, feelings and future opportunities Satisfactory attempt at capturing essential learnings, feelings and future opportunities Poor attempt at capturing essential learnings, feelings and future opportunities Insufficiently reflective or not communicated Reflections about: literature review, i.e. what you learnt while conducting the literature search process /summarising relevant articles/ designing the outline of the literature review/ writing up the literature review [Max 4 marks] Deep, insightful, well-stated, comprehensive capturing of essential learnings, feelings and future opportunities Very good attempt at capturing essential learnings, feelings and future opportunities Good attempt at capturing essential learnings, feelings and future opportunities Satisfactory attempt at capturing essential learnings, feelings and future opportunities Insufficiently reflective or poorly communicated Reflections about: methodology, i.e. what you learnt through discussions about methods/ sampling/questionnaire design/ data analysis and interpretation [Max 4 marks] Deep, insightful, well-stated, comprehensive capturing of essential learnings, feelings and future opportunities Very good attempt at capturing essential learnings, feelings and future opportunities Good attempt at capturing essential learnings, feelings and future opportunities Satisfactory attempt at capturing essential learnings, feelings and future opportunities Insufficiently reflective or poorly communicated Reflections about: the research experience, i.e. say what insights you gained, and any issues, struggles, challenges, synergies experienced, individually and in the teamwork [Max 4 marks] Deep, insightful, well-stated, comprehensive capturing of essential learnings, feelings and future opportunities Very good attempt at capturing essential learnings, feelings and future opportunities Good attempt at capturing essential learnings, feelings and future opportunities Satisfactory attempt at capturing essential learnings, feelings and future opportunities Insufficiently reflective or poorly communicated Your statement indicating which sections of this research project you personally wrote and how this experience provided you with opportunities to learn about Business Research [Max 4 marks] Evidence of a very good overall contribution Evidence of a good overall contribution Evidence of a satisfactory overall contribution Evidence suggests a poor overall contribution No evidence of personal contribution Total Marks (20) Comments: /20 HI6008 Business research Project – Assignment 4 – Reflective Journal HI6008 Business research Project – Assignment 4 – Reflective Journal HOLMES INSTITUTE OF FACULTY OF HIGHER EDUCATION A SYSTEMATIC REVIEW ON: THE CHALLENGES OF CYBER SECURITY FOR BUSINESS GROUP ASSISEMENT Contents Abstract3 Introduction4 Literature review5 Research Problems7 Research Question7 Abstract Being the hottest topic for today’s security issue in today’s environment, business organization are also facing the challenges of the cyber security. Business are upgrading towards technology for the efficient way in doing work and for the business as well as all the business wants to market their business to the people and Internet is the best platform to market and run business. Different attacks are performed using the Internet which disclose the information and privacy of the individual and an organization. Attacks and data breach are the main challenges of cyber security for today’s business organization if they are working online. There are new technologies being developed which assures more security then the todays advance encryption system and other system like block chain technology. The research focus on finding the challenges of cyber security in business and way to mitigate them. Knowing problem is not sufficient if the solution is not given. Introduction Companies’ infrastructure is using internet facilities for storing data, customer information, companies’ information and lot of information about companies. Success of any company depends on ability to protect its proprietary information and customer’s data from those who can misuse it (Soloviov & AlexanderDanilov, 2020). A series of protocols that an individual and company most follow to be sure about information which maintain “ICA”-integrity, confidentiality and availability this can be known as cybersecurity (Li, et al., 2018). Best cyber security infrastructure and manpower can be able to recover the data from power outages, errors or any hard drive failures and makes organization defendable to any external attacks. Cyber securities not only make the data secure but also protects from sophisticated criminals’ groups and ’script kiddies’ which may have capacity of using “Advanced President Threats” APTs. Continuous working is essential for business survival. Recovering from threats means business can gain businesses audience and customer trust during problematic situation? Business using digital programs they are vulnerable and open to attacks. Digitalization can bring opportunity for innovation and new ideas for business can be generated along with challenges also comes in a way (Mangat:, 2019). Digitalization is long time process to be secure ecosystem to regulate and control itself. Business decision maker are not 100% able to choose and implement latest high security systems. Basic cyber security protocol training should be given to employees which is just not performing in the organization which increase internal threats. Employees are not able to identify the virus’s emails and how to quarantine it, while giving notice to both internal and external authority. Bad results can be arising against decision maker frequent testing the right security strategy controls is to be tested even if the strongest controls are in place. Attackers are so smart they can find the small weak spots and knows how to exploit them, that may bring system down even stronger system is installed as you think. Good cyber hygiene or practicing the fundamental security tasks is the best solution that keeps majority of threats out (Sedjelmaci & Senouci, 2018). Any sophisticated hackers would avoid simple defenses best cyber securities strategies go well beyond the basics. Cyber securities also become more difficult as a company expands. For example, attack surface of a large-scale company is much larger than small or medium sized business. Business have many challenges of cyber securities not only from external but also from internal person. External persons like hackers will use your related information and customers detail for their beneficial but internal person can also misuse the data that are stored in internet. Literature review Cyber security is big challenges for business nowadays in securing the data and secret information. Peoples are using internet for good usage and some bad thinking person are misusing it so, good cyber security is most essential for business to secure their data and secrets about businesses (Kshetri, 2019). Complicated regulation system can be used in stored data to be opened. Latest security is available which is easier to use and very compactable to hack for outsider, such technologies should be used in company but due to the lack of regular network monitoring and staff illiteracy about the cyber security in organization. Challenges of cyber security in Business: Large attack opportunities for hackers: as devices and cars without drivers are becoming normal, internet of things (IOT) and BYOD business policies give criminals more space and access to cyber-physical systems. Cyber security is dealing with the increasing overlap between the physical and virtual worlds of information exchange (Tahsien, et al., April 7, 2020). Less effective rules and regulation: political discussions around customer policy will be complicating cybersecurity as they are unbale to track all the data breach and attacks. General Data Protection Regulation (GDPR) framework is implemented by European union by creating more hurdles for companies by making sure they can do business by not paying heavy fines (Goddard, 2012). Blockchain revolution: Being new technology, blockchain could bring revolution in cybersecurity issues problem solution but also takes time to understand use by global organization and individual. It is the digital medium for peer-to-peer value exchange, it is the technology which uses
Answered Same DayOct 16, 2021HI6008

Answer To: HOLMES INSTITUTE FACULTY OF HIGHER EDUCATION Page 2 of 3 Assessment Details and Submission...

Hartirath answered on Oct 17 2021
154 Votes
Security
Security
Student Name:
Unit Name:
University Name:
Date:
Contents
Introduction    3
My contribution to the topic selection, problem definition, research question, writing of topic approval submission, and team charter    3
My contribution to the literature review report, that is the sear
ch process, summarising of relevant articles, designing the outline/argument/structure of the literature review, writing up the literature review.    4
My personal contribution to the research methodology report, i.e.my role in discussions about methods, sampling, questionnaire design, data collection, analysis, and interpretation.    5
My reflections on the research experience, insights I gained, and any issues, struggles, challenges, synergies I experienced, individually and in the teamwork.    6
Include a statement indicating which sections of this research project (that you wrote) provided you with opportunities to learn about Business Research.    6
Conclusion    7
References    8
Introduction
The purpose of this reflective journal task is to record the key analysis of the entire unit learning method. In this reflective journal assignment, I will review or reflect on my progress in learning goals related to previous assessments in business research. The entry will reflect the "journey" of the realization and application of research paradigm information. Business research can be explained as the methodical examination of the process to obtain facts about management and business innovation and discoveries with some practical results. Through classroom study, I gained information about the methods and process of obtaining auxiliary data for research. In addition, through classroom lectures, I learned how to best answer learning questions. The work of the reflective journal will focus on the analysis of the strategies and actions used in my business research, as well as the choice of methods, models, and selected theories. One cannot learn from experience without reflection.
My personal contribution to the topic selection, problem definition, research question, writing of topic approval submission, and team charter
My strategic approach is vital when conducting an activity analysis. In the case of discussing behavior, I have developed a systematic plan in which all activities are mentioned. In the first step, I learn about the challenges of corporate network security. I conducted auxiliary research to identify and refine the research questions (Fichtner, 2018). I have conducted literary research and can benefit from other research results. The literature is very insightful, and after analysis, I decided to draft a research question to conduct a holistic study, namely, what impact does the challenge of cybersecurity on the enterprise have on the productivity and efficiency of the enterprise? After that, I had another brainstorming session to recognize other research fields or phrases. I conducted auxiliary research to identify and refine the research questions. I...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here