Carrying out a Systematic Search for Relevant Academic Research Articles
Introduction
Computer security refers to the tool to make sure that stored data cannot be read and compromised by any person without the approval. There is certain security, which entails the data encryption and passwords. Data encryption is the data translation into a form that is incomprehensible without an interpreting device. A password is a secret phrase, which provides a user access to specific program and system (Huffer and Reed 2017).
Cybersecurity is the technique of protecting computers, programs, networks, and data from the unofficial access or attacks that are intended for exploitation. There are certain areas of cybersecurity named information security, application security, network security and disaster recovery (Xu, Wendt, and Potkonjak, 2014).
Application security includes the measures, which are taken during the life-cycle development to keep the application from the threats. These threats can come through the flaws in the development, application design, exploitation, upgrading, and maintenance. There is certain technique, which has been used for application security named input parameter validation, authorization and authentication of users, management of a session, and manipulation of the parameter, management of exception and logging and auditing (Adi, Hamza, and Pene, 2018).
Information security keeps the facts and figures from unauthorized access to eliminate theft and maintain privacy. There are some tools, which are used to maintain the information security named authentication, identification and authorization of the user, and cryptography. It is also stated that disaster recovery planning is a procedure, which entails the performing risk assessment, developing priorities, building recovery strategies in case of a disaster. Business should have a concrete plan for recovery of disaster to resume normal business operation as promptly as possible after a disaster (Hashem, et. al., 2015).
Normal security entails the activities to keep the usability, truthfulness; reliability, and safety of the network. An appropriate network security targets the certain threats and overcomes them from dispersion on the network. There are different elements of network security named anti-virus and anti-spyware, firewall, to block unauthorized access to the network, virtual private network to offer secure remote access and Intrusion prevention systems to address fast-spreading threats like zero-hour attacks and zero-day (Hashem, et. al., 2015).
Search
Emerald
Keywords used to search in Emerald |
Filters used to refine the search |
Results i.e. no. of papers found |
Comments or reasons |
Role of computer security and networks |
Years used from 2014-2017 |
19 articles found |
A small number of papers found. |
impact of computer security and networks |
Years used from 2014-2017 |
39 articles found |
A small number of papers found. |
computer security and networks used to improve the performance of the business |
Years applied filtered from 2014-2017 |
2014 papers found |
Papers found helps to address the evaluation of a security and networks used to improve the performance of the business |
Strategy to improve computer security and networks |
Years applied filtered from 2014-2017 |
2103 papers found |
Papers found helps to find out a strategy for intrusion detection |
Challenges of applying computer security and networks |
Years applied filtered from 2014-2017 |
748 papers found |
Papers found helps to address the information security, Critical review and future directions for research |
ACM Search
Keywords used to search in ACM |
Filters used to refine the search |
Results i.e. no. of papers found |
Comments or reasons |
Role of computer security and networks |
Years used from 2014-2017 |
177 articles found |
A moderate number of papers found. |
impact of computer security and networks |
Years used from 2014-2017 |
123,434 articles found including articles and journals |
A maximum number of papers found. |
computer security and networks used to improve the performance of the business |
Years applied filtered since 2014 |
123,471 papers found |
Many papers founds |
Strategy to improve computer security and networks |
Years applied filtered since 2014 |
123,254 papers found |
Many papers found that helps to find out the hacking types. |
Challenges of applying computer security and networks |
Years applied filtered since 2014 |
123,440 papers found |
A large number of papers found. |
Sage Journals
Keywords used to search in Sage Journals |
Filters used to refine the search |
Results i.e. no. of papers found |
Comments or reasons |
Role of computer security and networks |
Years used from 2014-2018 |
Total of 1532 sage journals found |
Many papers found that helps to find out the role of computer security and networks |
impact of computer security and networks |
Years used from 2014-2018 |
1585 articles found including articles and journals |
Papers found to contain 1585 articles. |
computer security and networks used to improve the performance of the business |
Years applied filtered from 2014-2018 |
486 papers found |
Less number of journals found. |
Strategy to improve computer security and networks |
Years applied filtered from 2014-2018 |
782 papers found |
Many papers found that helps to address a strategy to improve computer security and networks. |
Challenges of applying computer security and networks |
Years applied filtered from 2014-2018 |
Only 429 paper found |
Papers found to contain only 429 paper. |
ScienceDirect
Keywords used to search in ScienceDirect |
Filters used to refine the search |
Results i.e. no. of papers found |
Comments or reasons |
Role of computer security and networks |
Years used from 2014-2018 |
Total of 1,009 journals found |
Many papers found |
impact of computer security and networks |
Years used from 2014-2018 |
19,406 articles found including articles and journals |
Many papers found |
computer security and networks used to improve the performance of the business |
Years applied filtered from 2014-2018 |
8,430 papers found |
Many papers found. |
Strategy to improve computer security and networks |
Years applied filtered from 2014-2018 |
14,983 papers found |
Many papers found. |
Challenges of applying computer security and networks |
Years applied filtered from 2014-2018 |
11,800 papers found |
Many papers found. |
Scholarly Articles
Keywords used to search in Scholarly Articles |
Filters used to refine the search |
Results i.e. no. of papers found |
Comments or reasons |
Role of computer security and networks |
Years used from 2014-2018 |
14,800 articles found |
Many articles found |
impact of computer security and networks |
Years used from 2014-2018 |
17,600 results found including articles and journals |
Many papers found |
computer security and networks used to improve the performance of the business |
Years applied filtered from 2014-2018 |
16,000 papers found |
Many papers found. |
Strategy to improve computer security and networks |
Years applied filtered from 2014-2018 |
16,300 papers found |
Many papers found |
Challenges of applying computer security and networks |
Years applied filtered from 2014-2018 |
16,000 papers found |
Many papers found |
Inclusion/Exclusion Process
An article having a good research question
An effective research question creates the article more emphasized on the topic that the author is assigning. Furthermore, an effective research question develops the readers more interesting to learn that article. A well-specified research question incorporates what the aim of the article is, the key idea of this article and also defines for whom the article is a mention for. These questions illustrate the readers about what the key purpose of this article is and what is a key aim of the author. The article that is involved in this literature search has a good research question that is required for a good article.
Computer security
Quality of writing
Quality of writing is another significant aspect of an article. The quality of writing creates a reader to comprehend regarding the aspect that the author is making effort to communicate. The content of the article should be comprehensible, precise with easier to identify. The article that is involved in this literature survey has an official and undoubtedly gives details regarding the methodology of the procedure.
Articles should not be too old
Articles that are too old are not presented to be good to involve in the literature survey. As technology grows promptly as compared to old technologies will be outmoded that is not used anymore. Citing on the old article that is outdated is unfavorable for the survey of the literature. The article may have high-quality research methodology and good content. However, the technology that is practiced in this article is outdated, as the technology will be rising every few years and older technology will be no exercise. The articles that are practiced in this literature survey are relatively associated with advanced technology that is presently evolving.
Paper |
Include/Exclude |
Reason |
Huffer and Reed 2017 |
X |
Talks about Situational awareness of network system. Not needed. |
Xu Wendt and Potkonjak 2014 |
ü |
Gives details about secure remote sensing and communication using digital puffs. |
Kayes and Iamnitchi 2017 |
ü |
Privacy and security in online social networks: A survey |
Adi Hamza and Pene 2018 |
X |
Not needed in this research paper. |
HashemYaqoob Anuar Mokhtar Gani and Khan 2015 |
ü |
Explains the rise of “big data” on cloud computing: Review and open research issues. |
Rathore Sharma Loia Jeong and Park 2017 |
ü |
Explains social network security: Issues, challenges, threats, and solutions |
Dupont 2014 |
X |
Not needed as it contains Private security regimes |
Bamrara Jamba and Rathore 2015 |
ü |
Needed in developing Association between IT Receptivity and Cyber Crime Victimization |
Stergiou Psannis Kim and Gupta 2018 |
X |
Not needed as it contains Secure integration of IoT and cloud computing |
Jing Vasilakos Wan Lu and Qiu 2014 |
ü |
Explains Security of the Internet of Things |
Yan Yu Gong and Li 2016 |
X |
Not needed as it contains software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments |
Ahmed Gani Sookhak Ab Hamid and Xia 2015 |
ü |
Needed in this research. Contains application optimization in mobile cloud computing |
Subramanian and Jeyaraj 2018 |
ü |
Needed in this research. Contains Recent security challenges in cloud computing |
Conclusion
From the above discussion, it can be concluded that the valid literature search has been used from a different source. The literature search involves several databases like ACM digital Library, ScienceDirect, Sage Journal, Scholarly Articles and Emerald. In this databases article, the researcher has refined the keywords required to search for relevant articles that are appropriate to the project. The articles gathered through different databases are peer-reviewed articles, has a good investigation question, has an effective conclusion and has good superiority of writing required for an article. These articles are chosen on the basis of keywords and it is refined during the search. Furthermore, certain practices can be used to choose an article regarding research concern. The article that complete the criteria required for the project are included in the survey of literature and the criteria that does not accomplish the criteria are excluded from this survey of the literature.
Research Purpose
The main purpose of this project is to analyze the role of computer security and networks: A case study of TESCO, UK. Following objectives will be used to complete the main aim of this research:
To explore the meaning and concept of computer security and networks
To investigate the role of computer security and networks: A case study of TESCO, UK
To recommend the strategy to improve computer security and networks: A case study of TESCO, UK
Cybersecurity
Research Question
RQ1: What are the meaning and concept of computer security and networks?
RQ2: What are the role of computer security and networks: A case study of TESCO, UK?
RQ3: Which strategy can improve computer security and networks: A case study of TESCO, UK?
Background Context
Network security considers different elements such as authorization, password, and username. It also contains the provisions and policies implied by a network administrator. This policy is used to put off and monitor unauthorized access, alteration in system, denial, and misuse of the computer network and accessible resources of the network. It is becoming significant for personal computer users and the organization. If network security is authorized then it is the responsibility of the organization to provide the access to network users (Carroll, 2014). However, this strategy could be failed to identify potential harmful elements like computer worms and Trojans being as the company is unable to avoid the unauthorized access. It is also evaluated that Anti-virus software and intrusion detection system aids the organization to identify the malware. In the current phenomenon, Tesco monitors the network such as wire shark traffic and logged for audit intention. For maintaining the privacy policy, communication between the two hosts is used as it would be effective for data encryption. It is stated that network security is becoming significant due to focusing on intellectual property as it could be promptly acquired by the internet (Almeshekah and Spafford, 2014).
Relevance to project
All the critically assessed academic investigations are associated with computer security and network. The proposed investigation is to identify the role of computer security and network. The critiques of current investigations would aid to assess what kinds of computer security challenges could occur in Tesco. It would also aid to assess the criteria and methodology with regards to computer security and networking would be evaluated and assessed.
Research Methodology
Research methodology is considered as a process, which is executed to gather the information with the purpose of completing the investigation in a systematic way. Moreover, research methodology is an organized as well as theoretical evaluation of distinct tools, which are specifically executed in the research area. This part depicts the depth comprehension with respect to technique, strategy, approaches, and purpose of gathering the data. These tools are beneficial to collect the appropriate data in order to eliminate the research issue and to attain the aim and objectives of research in an efficient and effective way (Peltier, 2016). Along with this, this research focuses on different research tools with appropriate justification.
Application Security
Research Strategy
The strategy of research is used as a mechanical technique to gather the data. It ensures that available data is effective to accomplish the aim and objective of the investigation. It also supports the researcher to address the facts and figures regarding research concern. It also aids the researcher to analyze a distinct set of information and to assess the feasible solution associated with the research issue. There is a distinct sort of research strategies, which is used by the investigator to meet the research. These strategies could be an experiment, literature review, cross-sectional studies, grounded theory and survey through a questionnaire (Liang, et. al., 2015).
In this dissertation, a survey through questionnaire tool would be executed by an investigator to pool the belief and perception of employees associated with research subject matter. Survey through questionnaire tool is used to gather the facts and figures and aids to diminish the chances of discrimination from work and also improve the research quality by gathering appropriate and trustworthy facts and figures. Although, survey tool is expensive and takes more time to complete the investigation yet, it facilitates more valid and precise information with regards to research concern (Li, Tryfonas, and Li, 2016). As a result, an investigator could improve the value of the research outcome. There is a large number of sources to use secondary facts and figures like company statement, books, articles, and internet. It would be executed by an investigation to improve the comprehension associated with research concern. These sources of secondary data could save the expenses and time of investigator to identify the information about the role of computer security and network: A case study of Tesco, UK.
Research Design
It is also part of research methodology, which helps to attain the objective of research in an effective and efficient way. There are some tools of research design that is applied by a researcher to complete the investigation. These tools could be qualitative, quantitative and mixed research design. For the purpose of this investigation, a mixed research design would be implemented by an investigator to accomplish the key objectives and aim of the investigation. This investigation would be chosen because it will include the distinctiveness of both quantitative and qualitative research design (Inukollu, Arsi, and Ravuri, 2014). In such condition, quantitative research design would be appropriate to evaluate the number of responses of predetermined respondents. Besides this, a qualitative research design would be implemented to analyze the correlation between computer security and network and Tesco, UK.
Information Security
Mix research design will aid a researcher to eliminate the barriers from the investigation. These barriers could be raised during the research. Therefore, mix research design would be applied to generate conceptual and theoretical knowledge regarding the role of computer security and networks: A case study of TESCO, UK
Data Analysis Methodology
It is a significant element of research methods that are used to address the appropriate and trustworthy result. After gathering the facts and figures, n investigator will engage to evaluate the information through statistical and content analysis technique (Acemoglu, et. al., 2016). For the purpose of this research, an investigator will apply the statistical data assessment technique to analyze the facts and figures in a comprehensible manner. In addition, Ms-excel software would be implemented to demonstrate the information via various kinds of graphs, tables, and charts. Consequently, it would be prominent to describe the data in a logical mode.
The evaluation methodology is a technique to aid an individual to understand the process, which is required for the evaluation of quality. There are two methodologies are used in the evaluation of research named formative and summative. In such a case, formative evaluation is used to assess the program for the duration of development. This evaluation technique is effective to make an early improvement. It also aids to get better the program. On the other hand, the summative evaluation methodology facilitates the effectiveness of program and information. It is also obtained after the end of program design. For summative evaluation, survey through questionnaire will be used to evaluate the research issue. Further, 50 employees would be used to evaluate the investigation. For evaluation, data will be analyzed through a number of responses on the research issue i.e. role of computer security and network in Tesco, UK. As well as, cost-benefit analysis tool would be applied by an investigator to evaluate the research. This technique will be executed to compare the existing costs and benefits of programs with future program, policy or process. In this way, a cost is regarded as the negative effect of an organization, which is resulting from the implementation of research such as research and development cost. A benefit is defined as any positive impact of Tesco, which is resulting from the implementation of research. These benefits could be a reduction in cost, increase productivity, and save time.
Following would cost for this project:
For analyzing the literature review, different secondary sources would be used such as academic journals, editorial, online resources, and text-book. These academic publications would be effective to get the authentic information in minimum time. Further, each survey through questionnaire would be supported by these academic publications. As a result, it would increase the reliability and validity of the outcome.
Network Security
There would be no professional, legal or ethical issue with this research as below: –
Professional considerations
A researcher will gather the facts and figures via using secondary data as it would be effective to decline the chances of manipulation and plagiarism concern to complete the investigation. Further, own language will be used by a researcher with suitable in-texting. Moreover, an investigator will keep the privacy and confidentiality of data regarding respondents to avoid the issues of ethics from research.
Legal considerations
The law and regulation could also create complexities to conduct the research. With this intention of this research, an investigator will use different laws to complete the research in an effective and efficient manner. These laws are health and safety acts, data protection acts. The equality act, human rights, and copyright and defamation laws. It could impact on the overall research. The researcher would also focus on storing the informing of an individual and identify the data, which should be disseminated as well as consider the human rights of respondents (Zhang, et. al., 2014).
Ethical considerations
Ethical consideration is an essential chapter of research, which is applied to gain the appropriateness of research and its outcome. Because, there are possibilities of existing ethical uncertainties associated with the manipulation of information, plagiarism, and privacy of investigated information (Tan, et. al., 2014).
For the purpose of this research, ethical consideration would be related to particular research strategy and technique, which would be implemented by an investigator to reduce the chance of ethical concern. Moreover, secondary information would be collected from wide varieties of sources such as an article, online websites, books and offline and online publication. These sources will be implied by an investigator by offering the appropriate references with feasible in-texting. These sources would be cited carefully as it would be appropriate to eliminate the copyrighting issues (Shameli-Sendi, et. al., 2016). As well as, university approaches and guidelines associated with the code of conduct would be executed in this investigation in order to eliminate the ethical issues (Dabbagh, et. al., 2015).
References
Huffer, K.M. and Reed, J.W., 2017, April. Situational awareness of network system roles (SANSR). In Proceedings of the 12th Annual Conference on Cyber and Information Security Research (p. 8). ACM.
Xu, T., Wendt, J.B. and Potkonjak, M., 2014, October. Secure remote sensing and communication using digital puffs. In Proceedings of the tenth ACM/IEEE Symposium on Architectures for networking and communications systems (pp. 173-184). ACM.
Kayes, I. and Iamnitchi, A., 2017. Privacy and security in online social networks: A survey. Online Social Networks and Media, 3, pp.1-21.
Strategy to improve computer security and networks
Adi, K., Hamza, L. and Pene, L., 2018. Automatic security policy enforcement in computer systems. Computers & Security, 73, pp.156-171.
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, pp.98-115.
Rathore, S., Sharma, P.K., Loia, V., Jeong, Y.S. and Park, J.H., 2017. Social network security: Issues, challenges, threats, and solutions. Information Sciences, 421, pp.43-69.
Dupont, B., 2014. Private security regimes: Conceptualizing the forces that shape the private delivery of security. Theoretical Criminology, 18(3), pp.263-281.
Bamrara, A., Jamba, L. and Rathore, A., 2015. Information Security: Exploring the Association between IT Receptivity and Cyber Crime Victimization. FIIB Business Review, 4(1), pp.55-63.
Stergiou, C., Psannis, K.E., Kim, B.G. and Gupta, B., 2018. Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, pp.964-975.
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D., 2014. Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), pp.2481-2501.
Yan, Q., Yu, F.R., Gong, Q. and Li, J., 2016. Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), pp.602-622.
Ahmed, E., Gani, A., Sookhak, M., Ab Hamid, S.H. and Xia, F., 2015. Application optimization in mobile cloud computing: Motivation, taxonomies, and open challenges. Journal of Network and Computer Applications, 52, pp.52-68.
Subramanian, N. and Jeyaraj, A., 2018. Recent security challenges in cloud computing. Computers & Electrical Engineering, 71, pp.28-42.
Acemoglu, D., Malekian, A., and Ozdaglar, A. (2016) Network security and contagion. Journal of Economic Theory, 166, pp. 536-585.
Ahmad, I., Namal, S., Ylianttila, M., and Gurtov, A. (2015) Security in software-defined networks: A survey, IEEE Communications Surveys, and Tutorials, 17(4), pp. 2317-2346.
Ali, M., Khan, S. U., and Vasilakos, A. V. (2015) Security in cloud computing: Opportunities and challenges, Information sciences, 305, pp. 357-383.
Almeshekah, M. H., and Spafford, E. H. (2014, September) Planning and integrating deception into computer security defenses, In Proceedings of the 2014 New Security Paradigms Workshop (pp. 127-138). UK: ACM.
Ben-Asher, N., and Gonzalez, C. (2015) Effects of cybersecurity knowledge on attack detection, Computers in Human Behavior, 48, pp. 51-61.
Carroll, J. M. (2014) Computer security. UK: Butterworth-Heinemann.
Chang, V., Kuo, Y. H., and Ramachandran, M. (2016) Cloud computing adoption framework: A security framework for business clouds, Future Generation Computer Systems, 57, pp. 24-41.
Dabbagh, M., Hamdaoui, B., Guizani, M., and Rayes, A. (2015) Software-defined networking security: pros and cons, IEEE Communications Magazine, 53(6), pp. 73-79.
He, D., Chan, S., and Guizani, M. (2015) Mobile application security: malware threats and defenses, IEEE Wireless Communications, 22(1), pp. 138-144.
Jokar, P., Arianpoo, N., and Leung, V. (2016) A survey on security issues in smart grids, Security and Communication Networks, 9(3), pp. 262-273.
Li, S., Tryfonas, T., and Li, H. (2016) The Internet of Things: a security point of view, Internet Research, 26(2), pp. 337-359.
Liang, W., Li, Z., Zhang, H., Wang, S., and Bie, R. (2015) Vehicular ad hoc networks: architectures, research issues, methodologies, challenges, and trends, International Journal of Distributed Sensor Networks, 11(8), P. 745303.
Mir, N. F. (2014) Computer and communication networks. UK: Pearson Education.
Peltier, T. R. (2016) Information Security Policies, Procedures, and Standards: guidelines for effective information security management. USA: CRC Press.
Schäfer, G., and Rossberg, M. (2016) Security in Fixed and Wireless Networks. USA: John Wiley and Sons.
Scott-Hayward, S., Natarajan, S., and Sezer, S. (2016) A survey of security in software-defined networks, IEEE Communications Surveys, and Tutorials, 18(1), pp. 623-654.
Shameli-Sendi, A., Aghababaei-Barzegar, R., and Cheriet, M. (2016) Taxonomy of information security risk assessment (ISRA), Computers and security, 57, pp.14-30.
Sreevidya, B., Rajesh, M., and Mamatha, T. M. (2018) Design and Development of an Enhanced Security Scheme Using RSA for Preventing False Data Injection in Wireless Sensor Networks. In Ambient Communications and Computer Systems (pp. 225-236). Singapore: Springer.
Stallings, W. (2016) Cryptography and network security: Principles and practice. UK: Pearson.
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., and Hu, J. (2014) Enhancing big data security with collaborative intrusion detection. IEEE cloud computing, 1(3), pp. 27-33.
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J., and Di Renzo, M. (2015) Safeguarding 5G wireless communication networks using physical layer security, IEEE Communications Magazine, 53(4), pp. 20-27.
Zeng, L., Xiao, Y., Chen, H., Sun, B., and Han, W. (2016) Computer operating system logging and security issues: a survey, Security and Communication Networks, 9(17), pp. 4804-4821.
Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Crowley, P., Papadopoulos, C., and Zhang, B. (2014) Named data networking, ACM SIGCOMM Computer Communication Review, 44(3), pp. 66-73