Please enable JavaScript.
Coggle requires JavaScript to display documents.
Research, Research Process Diagram, Background, Dissertation Proposal Form…
-
-
Background
The Company was founded in 1990 as a joint venture to provide logistics services to Nissan Motor Manufacturing UK when they established their production plant in the northeast of England. The company has organically grown to increase its offerings and develop partnerships with other global organisations such as Rolls-Royce, Komatsu, Thorn Lighting, Envision and Bentley. Following a buyout by Hitachi Transport System in 2012, the company became part of one of the largest global transport and storage providers.
VEU introduced a digital transformation strategy in April 2022 and since then, introduction of technology and digital assets have grown at an exponential rate. The business has introduced many of its inhouse designed information systems and both primary and secondary teams are provided increased levels of business analytics and insights to aid decision making. Many operators and managers have been with the business for a very long time and while work to increase overall digital acumen is underway, the gap is significant, and the general population and culture remains as it has done for the last 30+ years.
Despite this rapid growth in technology, the business has viewed cyber security as solely an IT function and responsibility. This has led to strong network, perimeter, application and cloud security, but significant risks remain in the form of both physical security loopholes such as malicious insiders or password/log in credentials management and an ever-growing risk of social engineering attacks.
In addition, the business is viewed as a local leader in digital transformation, winning local awards and increasing both its exposure and its customer base, often leading to VEU managing customer data and information on their behalf.
In summary, cyber awareness in VEU has become a critical issue to research due to:
- Rapidly increasing attack surface for the business.
- Historically, VEU viewed cybersecurity as an IT issue, not a business issue.
- Digital acumen and cyber awareness underdeveloped or non-existent within the workforce.
- Greater exposure and online presence for the business.
- Growing customer base and digital asset management.
-
-
Includes
-
-
Philosophical basis of different types of interpretive approaches, at least four substantively different strands of thought: phenomenology, ethnomethodology, the philosophy of language, and hermeneutics.
-
-
-
-
-
Objectives
-
-
Design tailored cyber awareness training modules to address identified knowledge gaps and mitigate risks.
Implement a variety of training delivery methods, such as workshops, online modules, and simulated phishing exercises, to engage employees and reinforce learning.
Measure the effectiveness of the cyber awareness programs in terms of improving employee knowledge, changing behaviours, and reducing security incidents.
Collaborate with leadership and stakeholders to ensure ongoing support and commitment to the cyber awareness initiatives.
Establish key performance indicators (KPIs) to track the success of the cyber awareness programs and make data-driven decisions for program improvement.
Preparation
-
-
Your research design including methodological choice, research strategy and time frame
-
-
-
-
Five Step Process
-
-
Select and evaluate relevant research studies using predetermined, explicit inclusion and exclusion (selection) checklists of criteria to assess the relevance of each in relation to the review question(s).
-
-
-
-
Planning
Literature Review
Non-referenced academic journal
May contain detailed reports of research. Selected by editor or editorial board with subject knowledge.
Professional journals
Mix of news items and practical detailed accounts. Sometimes include summaries of research.
-
Books and e-books
Written for specific audiences. Usually in an ordered and relatively accessible format. Often draw on a wide range of sources.
Newspapers
Written for a particular market segment. Filtered dependent on events. May be written from a particular viewpoint.
-
Reports
Topic specific. Written by academics and organisations. Those from established organisations are often of high quality.
-
Referenced (peer-reviewed) academic journal
Detailed reports of research. Written by experts and evaluated by other experts to assess quality and suitability for publication. Rigorous attention paid to detail and verification.
Relevance Tree
-
-
-
-
Identify those areas that you need to search immediately and those that you particularly need to focus on. Your project tutor will be of particular help here
As your reading and reviewing progress, add new areas to your relevance tree
-
-
-
The criteria you intend to use to select the relevant and useful studies from all the items you find
-
Research Onion
Techniques
& Procedures
Time Horizon
Strategy(ies)
Methodological
Choice
-
Mono-method Quantitative
Mono-method Qualitative
Multi-method Quantitative
Multi-method Qualitative
Mixed Method Simple
Mixed Method Complex
-
Experiment
Survey
Archival Research
Case Study
Ethnography
Action Research
Grounded Theory
Narrative Enquiry
-
-
-
-
-
-
-
-
-
-
-
-