Literature review
Discuss about the Challenges of Cyber Security on Business performances.
Cyber security can be understood as the process and set of technologies which is designed in order to protect data and systems in the cyber world from the cyber-attacks (James, 2016). Due to the increased use of internet and technology, the number of cyber-attacks have increased. The research is about the challenges of cyber security on the business performance of the medium and large scale enterprises in Pakistan. The project proposal includes the research questions and the methodology which will be used to take up the research. Conclusion and recommendations will be provided for future of the industries of Pakistan.
The main objective of the project is to find out the challenges through which the medium and large enterprises of Pakistan are going through. It will further aim at investigation of the cyber threat protection policies in Pakistan which helps the enterprises in resolving the problems faced by the companies. It is also to find out the main threats and their effect on the companies. It will help in combating those threats and finding a way for businesses to perform well without being a prey to cyber attackers (Hall, 2016).
The scope of the project is broad. It is because Cyber security challenges are faced by almost every next organisation in the world. This is because of the growing use of internet (Clemente, 2013). The project affirms that if proper actions will be taken up by the government and companies, a tough fight can be given to the cyber attackers and the threat can be reduced. The scope is broad because it discusses about the whole medium and large scale enterprises of Pakistan.
From the review of literature, it can be said that different authors have different opinions on the topic. As per Reddy & Reddy (2014), the cyber attackers hit the integrity and confidentiality of data and pose a serious challenge to the businesses as this information be leaked to competitors. This is why, it is considered as one of the most common and serious threats because it might hamper the overall global position of the business (Foreshew, 2017).
In the opinion of Elmaghraby & Losavio (2014), the medium and large enterprises of the nation plays a major role in its development. These industries or companies helps in generating employment thereby reducing poverty and giving basic living to people. The loss of data of these enterprises will indirectly impact the population working in these companies. The hackers have the main motive to leak the sensitive information either to blackmail or to use it against the owner of data. In Pakistan, National Database and Registration Authority (NADRA) is the authority which keep details regarding passports, networks of mobile, bank passwords, bank details, etc. Cyber attackers might target NADRA for accessing the information which could have major negative implications in future.
Research Questions
As per Choo (2011), the cyber security issues decreases the overall business performance and creates a fear of losing the data. The hackers generally attack the single server and then link it to other servers to destroy all the systems at once. DDoS attacks is the biggest threat which made its victims like BBC, Rio Olympics and more (Lohrke, Frownfelter-Lohrke and Ketchen Jr, 2016). Cyber-attacks not only results in the loss of trust between the company and the customer but also results in the loss of profits. It is very important for the enterprises to adopt data protection systems and privacy policies so that they can save themselves from facing the havoc (Nojeim, 2010).
In the words of Awan and Memon, (2016), Pakistan is a developing country and the attacks like Trojans, frauds, phishing are most commonly faced by the companies operating in the country. To prevent themselves from the cyber-attacks, the government should run training programs for the medium and large scale enterprises to let them know how they can protect their data and business as a whole (Kaplan, Sharma & Weinberg, 2011).
It is evident that no country is now untouched with cyber threat. The countries who are actively using technology is also facing the repercussions and are becoming the victims of cyber criminals. This is a serious issue which should not be ignored and should be taken care of so that the company could play safely with the data without getting in the fear of losing the confidential data and privacy (Abomhara, 2015).
There is a gap in the literature review that it does not discuss about the steps which could be taken by the collaboration of government and businesses to combat the serious threat. Strong laws should be made to punish the cyber attackers, once caught. It has been seen that there is no strong law and legislation are made to meet cyber threats in Pakistan which is a danger sign for the companies
The main research questions are divided into primary and secondary questions.
Primary question
- What are the challenges of cyber security on business performances of medium and large enterprises in Pakistan?
Secondary questions
- How Pakistan is facing the challenge of Cyber security in business
- What steps the government and business should take to meet these challenge
Here in this section, methods will be discussed which will be used to perform the whole research on the topic. This section is of major importance as this will only determine the process of research and data collection process which helps in reaching out to a final conclusion.
Research process
This type of research begins with a plan where time and scope will be determined. The next step involves the development of research objectives and questions. Next step includes the steps which are used to meet the objectives of the research and the last step is to develop final research project report (Mackey & Gass, 2015).
Research Methodology
Reliability and Validity
The data is reliable which is checked through the references and sourcing of data. This is inductive research because a theoretical base is made for the research.
Sampling technique and sample size
For collecting qualitative data, sampling would be made on non-probability sampling basis. An interview will be planned with 10 medium and large sized enterprise business employees or owners which will help in collecting quality data. The sample size is 10.
Data collection
Data is collected over here with the help of structured interview where set of questions will be asked from the respondents and they will be allowed to answer them in details. The interview questions will be open ended so that subjective information can be gained from the respondents.
Research process
The initial step of quantitative research is identification of the problem after which the questions are developed for research and then review is conducted of different secondary sources. Further, research methodology is planned and data is collected through various sources. The data collected will be analysed after collection. Further, conclusion and recommendations will be given for giving further suggestions on the future research (Wilson, 2016)
Instrument of research
Data is collected through a set of structured questionnaire which will be used to conduct survey among 50 employees working in the medium and large enterprises in Pakistan.
Data is also collected through secondary sources like books, journals, publications from government, online websites and news articles.
The data collected but using research instrument will be analysed with the help of statistical methods like SPSS and MS excel. These will help in giving the results of the opinions of sample size and then will help in giving the final results of the research.
Sampling technique and size
Random sampling technique will be used in this assignment to select the employees from the medium and large enterprises in order to collect data about cyber security challenges to their business and what steps they take to meet these challenges. The sample size is 50.
Reliability and Validity
The research is reliable as the data is collected after gaining the permissions and orders from the relevant authorities. The questions are asked which do not mean to hurt the sentiments of any group of people. No fake information is given in the research and this is proved by sources used which are genuine and shows real data for the topic.
Data Analysis
Data collection
Two types of sources are used in this research to collect data for coming to a conclusion as to what challenges are faced by business and its performance in maintaining cyber security (Cooper, Schindler & Sun, 2006). These sources include primary and secondary sources. Primary sources of data collection used are books, relevant government publications, reports, websites, journals and more. Also, a set of 10 questions were prepared to develop a questionnaire on the basis of which the survey will be conducted
Research Limitations
The research had some limitations which might hamper the final results of the research process. The first limitation is of time. The time available for the research is limited which might not give results in details because a small sample size is selected which might not provide the actual results of the whole population. The resources are limited because of which more research cannot be done. The responses provided by the respondents might be biased because they do not want to showcase real picture of their protection methods from cyber threats. All these limitations will deviate the actual results of the research.
The research plan made will help in completing the activities of research within the set time.
Series |
Activities of Research |
Duration (in days) |
A |
Planning for research |
10 days |
B |
Plans execution |
5 days |
C |
Collection of data |
16 days |
D |
Data analysis |
16 days |
E |
Conclusion |
10 days |
F |
Recommendations for future research |
5 days |
(Panneerselvam, 2014).
Conclusion
It can be concluded that cybercrimes are increasing drastically because of the increased use of technology. Data collected from various sources which suggest that the government should take certain steps which helps in fighting the evils of cybercrime. The government should frame strong laws and policies which will save the confidential data of the medium and large enterprises. It will also save employment of people and data in banks, stock exchanges, government sectors, etc. which could save the country from terror attacks also. It is recommended that the medium and large industries should work in collaboration with the government for combating the serious issue and for eliminating it from roots
Reference List
Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Awan, J. & Memon, S. (2016). Threats of cyber security and challenges for Pakistan. In International Conference on Cyber Warfare and Security (p. 425). Academic Conferences International Limited.
Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), pp.719-731.
Clemente, D. (2013). Cyber security and global interdependence: what is critical?. Chatham House, Royal Institute of International Affairs.
Cooper, D.R., Schindler, P.S. & Sun, J. (2006). Business research methods (Vol. 9). New York: McGraw-Hill Irwin.
Elmaghraby, A.S., & Losavio, M.M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of Advanced Research, vol. 5, no. 4, pp. 491-497.
Foreshew, J. (2017). Australia faces cyber security skills crisis as challenge. Financial Review.
Hall, P. (2016). Smaller banks face cybersecurity challenges. Westchester County Business Journal, vol. 52, no. 46, pp. 15.
James, C. (2016). Cybersecurity: Threats Challenges Opportunities. ACS.
Kaplan, J., Sharma, S. & Weinberg, A. (2011). Meeting the cybersecurity challenge. McKinsey & Company.
Lohrke, F.T., Frownfelter-Lohrke, C. & Ketchen Jr, D.J. (2016). The role of information technology systems in the performance of mergers and acquisitions. Business Horizons, 59(1), pp.7-12.
Mackey, A. & Gass, S. M. (2015). Second language research: Methodology and design. Routledge.
Nojeim, G. T. (2010). Cybersecurity and Freedom on the Internet. J. Nat’l Sec. L. & Pol’y, 4, p.119.
Panneerselvam, R. (2014). Research methodology. PHI Learning Pvt. Ltd..
Reddy, G.N. &Reddy, G.J. (2014). A Study of Cyber Security Challenges and its emerging trends on latest technologies. arXiv preprint arXiv:1402.1842.
Wilson, V. (2016). Research Methods: Mixed Methods Research. Evidence Based Library and Information Practice, 11, 56-59