Project Scope and Objectives
The research proposal shall discuss and explicate the cyber security challenges faced by the retailer Kmart, Australia in the recent time. The proposal explores the problems of cyber security that is accelerating at a rapid pace. Subsequently, the cyber topography is becoming excessively convoluted and profoundly affecting the business domain (Von and Van 2013). The cyber security is a problematic sphere and it gravely influences the financial sectors. The expansive corporations, government agencies and financial institutions become the potential targets of Advanced Persistent Threat (APT), phishing assaults and Distributed Denial of Services (DDOS) (Klimoski 2016).
In the recent time, the retail chain, Kmart in Australia witnessed serious business challenges related to the cyber security. These cyber issues have gravely jeopardized the organizational structure of the leading Australian retain chain, Kmart. The developed countries such as United States of America, United Kingdom, Mexico and Australia have countenanced cyber troubles. Therefore, cyber security challenges pose a serious threat to the business domain.
It is indispensable to augment the cyber security potentialities over the past five years. Initially, formal mechanisms have been used to identify potential IT threats and establish strategies of mitigation. In the same way, scores of dollars have been used to implement these organizational strategies. Over the past five years, the cyberspace has undergone wide ramifications and modifications. In the recent time, the ‘Desktop environment’ sees a glimmering revolution and is superseded by the phase of laptop and minicomputer. At the same time, the USB ports become disabled and the Web mail service is defunct (Gordon et al. 2014). In the present era, effective technologies are used to identify potential threats in the business sectors. In the banking and financial sectors, cyber threats have gained varied contours like phishing, scamming and hacking of banking details (Osborn 2014). The cyber security threat becomes a negative phenomenon that culminates in the development of serious criminal problems across the globe (Zubilevych 2017). The business and financial sectors should adopt punitive measures that shield the business platforms from ensuing cyber threats (Wang et al. 2015).
The research proposal shall reconnoitre possible cyber security threats that are detrimental to the business forums and financial sectors. The research proposal specifies the cyber security challenges faced by the retailer Kmart, Australia. The proposal discusses and explains the cyber problems faced by the retail and e-commerce units of Australia. The research will be conducted by intersecting past literary surveys and recent technological patterns. It will be formed on the basis of qualitative data analysis. In the end, the research shall recommend punitive measures that will shield the cyberspace from any violent assault.
Dearth in Literature Review
The aims and objectives of the project are as follows:
- To delve into the recent cyber security assault of the leading Australian retailer, Kmart and comprehend the extraneous and intramural factors of the problem
- To involve the Information Technology forensic department investigators for establishing the factors that lead to the vulnerabilityof the cyberspace
- To study the overarching cyber challenges and identify the potential cyber threat that damaged the reputation of retailer Kmart in Australia
- To recommend possible solutions that will mitigate the cyber security problems in the business domain
The research literature analyses the evolving terrain of cyberspace crimes that have damaged the reputation of online retailers and e-commerce hubs (Klimburg 2013). It discusses about the reality of cyber challenges that permeate the digital landscape. The Connolly report shows that the cyberspace crime is entrenched in the Australian companies in 2015-16 (Connolly 2016). In the report, the companies specified that they cyber crime has foiled their efforts for securing a reputed position in the global market. Gandhi (2011) suggests that every company is software dependent, which makes the cyber forum vulnerable to potential technology threats. They claim that the cyber security attacks are instigated by political, social and cultural factors. These factors culminate in the development of cyberspace problems in the recent time (Gandhi et al. 2011).
The research literature identifies key challenges that are detrimental to the cyberspace problems. These challenges are discussed widely in the literature review section. Due to the persistence of these potential threats, the cyberspace security of certain retail companies like Kmart, Australia is at stake. In the ensuing paragraphs, I shall posit some crucial questions that have hitherto not been raised in this domain.
- Do the digital data have become increasingly pandemic in the recent time?
- Are corporations more open to the world through the usage of smart phone connectivity and digital platform?
- Do the logistic chains of the corporations have encouraged infringement practices?
- Is there any vestige of organized malware crime in the recent time?
- Does the Kmart cyber case set a new paradigm in this domain? How would one identify the key problem relating to the Kmart crisis?
Based on the scope and objectives of the project, the research hypothesis shall be adumbrated in the particular study.
- H (1) Null Hypothesis: The retail corporations and e-commerce platforms are not susceptible to cyber security crisis.
- H (2) Alternate Hypothesis: The retail corporations and e-commerce platforms are susceptible to cyber security crisis.
Research design identifies the particular research problem that leads to the preparation of the research project (Creswell 2013). In this particular project, I shall specify the research problem that is indispensable for the conduct of the research.
The methodology of research is the variant of research method used by the researchers. The methodology of research functions at the integration of theoretical and empirical models. These two models are integral to determining the research course (Mackey and Grass 2016).
There are three types of investigation:
- Investigative or explorative
- Discursive or Theory-oriented paradigm
- Hypothesis oriented model
The Investigative or explorative model explicates that the researcher should have a clear cognizance of the research topic. The researcher will accomplish the subject based on scientific analysis.
The Discursive or theory-oriented model expounds the close intersection between theoretical conceptualization and practical experimentation. The researchers outline the research with the assistance of apposite theories and research frameworks.
In the Hypothesis oriented model, the researcher elucidates a theorem. Based on the cumulative results of the theorem, the researchers initiate the study process.
The researcher situates his research questions within a broad discursive ambit. Based on the appropriate theories and concepts, the researcher explains the research questions and the theme of the study.
Research Questions
Data forms an important part of the research. The researcher moulds the study by integrating secondary and primary data. Primary data is the assemblage of significant data from the survey questionnaires. On the other hand, the secondary data gives a stimulus to the researcher for establishing a new angle in the subject (Crumbley and Church 2013)
For this research, the researcher will conduct a research on the affected retailers and the e-commerce platforms. At the same time, the researcher will extract information from the popular corporations (such as KPMG, Wipro and Infosys) and delve into their logistic chains for better understanding of the problem.
Bernard (2016) claims that there are two types of sampling method for accomplishing the research study. These are enumerated as:
- Probability
- Non-Probability
As far as research is concerned, the researcher will apply non-probability method. The research will use a bunch of employees of both retail and logistic sections.
To the extent availability issues are concerned, the researcher confronts issues identifying with the conceivability and clarity of the pertinent assets. The behavioural reaction gotten from the interviewees is a noteworthy piece of the exploration.
For directing the exploration, it is essential for the specialist to organize moral introduce all through the procedure. As indicated by the Data Protection Act, 1988, an analyst needs to keep up the privacy of the unpublished work while directing the examination. The analyst ought not to reveal the detail of the respondents. They are under a strict impulse to keep up the mystery of the procedure.
Data Analysis plan includes two factors, namely,
- Qualitative Data Analysis
- Quantitative Data Analysis
To the extent this examination is concerned, the scientist should apply subjective information investigation technique. The examination investigation depends on the subjective component. In this way, the scientist needs to receive subjective information investigation approach. The strategy has no numerical figuring. As far as this exploration is concerned; the analyst should utilize subjective information investigation approach. The investigation of the exploration point is commenced on the subjective aspect. In this manner, the scientist needs to choose the subjective information examination strategy. The technique does not involve scientific computation. The subject decrease offers of nearby shops because of web based shopping require subjective information investigation technique. The examination compares hypotheses and commonsense reactions for supporting the theme.
The planned thesis shall contain five sections.
- Chapter One will elucidate the research proposal as outlined in the assignment
- Chapter Two will explain the case study of the research
- Chapter Three will use the elaborated study of the methodology of research such as literature survey, data analysis process that manifest the crucial findings related to the cyber security problems
- Chapter Four will prepare the study report of the findings and statistical processing of the research proposal
- Chapter Five will provide a cognitive picture of the important discoveries and explain the implications of cyber security problems in the recent time (particularly revealing light on the fundamental strategies applied by the retailers and corporations to fight against the cyber crime).
Research limitations are the shortcomings or dearth that the researcher counters during the course of the research. As far as this research is concerned, the researcher will definitely face some research limitations that are vindictive for him. In this case, the researcher will find it difficult to ascertain whether the logistic chains use any corruptive practices to extract information from the corporation. The researcher has to make a hypothetical picture for this sector.
Conclusion
Summing up, in the recent time, the retail chain, Kmart in Australia witnessed serious business challenges related to the cyber security. These cyber issues have gravely jeopardized the organizational structure of the leading Australian retain chain, Kmart. The developed countries such as United States of America, United Kingdom, Mexico and Australia have countenanced cyber troubles. Therefore, cyber security challenges pose a serious threat to the business.
References
Bernard, H.R., Wutich, A. and Ryan, G.W., 2016. Analyzing qualitative data: systematic approaches. SAGE Publications
Creswell, J.W., 2013. Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications.
Cumbley, R. and Church, P., 2013. Is “Big Data” creepy? Computer Law & Security Review, 29 (5), 601–609.
Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q. and Laplante, P., 2011. Dimensions of cyber-attacks: Cultural, social, economic, and political. IEEE Technology and Society Magazine, 30(1), pp.28-38.
Gordon, L.A., Loeb, M.P., Lucyshyn, W. and Zhou, L., 2014. Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model. Journal of Information Security, 6(01), p.24
Klimburg, A., 2013. National cyber security framework manual.
Klimoski, R., 2016. Critical Success Factors for Cybersecurity Leaders: Not Just Technical Competence. People and Strategy, 39(1), p.14.
Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design. Routledge
Osborn, E., 2014. Business versus technology: Sources of the perceived lack of cyber security in SMEs.
Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security. Computers & Security, 38, pp.97-102.
Wang, P., Ali, A. and Kelly, W., 2015, August. Data security and threat modeling for smart city infrastructure. In Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on (pp. 1-6). IEEE.
Zubilevych, A.V., 2017. Cyber SECURITY in Business.