How to identify and fix the gaps in security management in order to prevent cyber attacks.
Under the heading method and design in your research proposal regardless of the method/approach used qualitative, quantitative, or mix methods, you will need to discuss the data collection instrument (tool) you propose to use to gather data. The word instrument is the general term that researchers use for a measurement device (survey, questionnaire, test, interview, observation, etc.). Discuss the instrument you intend to use in your research proposal and how you intend to address the instrument’s validity and reliability noting the different types of each.
First, I will need to create the survey in such a way that any potential biases or distortions are minimized. This includes designing questions with non-leading language and avoiding double-barreled questions that ask respondents about more than one thing at once. Additionally, I will conduct pilot testing with sample groups before launching the final version of the survey in order to identify any errors or issues that may have been overlooked during development.
Once I have finalized the design of the survey instrument, it is important that I assess its validity and reliability in order to ensure its appropriateness for use within my research context. Validity refers to how accurately a test measures what it is supposed to measure; therefore, collecting evidence regarding construct validity (proving whether items on a scale are measuring what they purport) would help strengthen my argument for using this particular instrument over others. Reliability pertains more specifically to consistency across repeated measurements; thus, demonstrating inter-rater reliability (showing agreement between multiple raters) could demonstrate the trustworthiness of this assessment tool’s outcomes.
Overall, by taking all necessary precautions during both design and implementation phases related to this particular instrument – i.e., surveys – researchers should be able to minimize possible risks associated with gathering inaccurate or unreliable data due their usage within empirical studies.
The case that was examined was situated in the US (see supplement) on the subject of ‘cyberstalking’. This wrongdoing was about an ex-cop named William Rosica who made a phony individual in his provocation of ex. Rosica made a phony web-based personality named ‘Katy Jones’ and expressed that he was likewise getting irritated by this character; examination found he was Katy Jones. He had bothered his ex causing “incurred horrendous close to home agony” by sending her many savaging and blazing messages and instant messages, attempting to inspire her to end it all as well as definitely realizing that she was “sincerely delicate”. Past exploration discoveries recommend that cyberstalker’s will quite often utilize messages to undermine and bug casualties, more than some other electronic gadget (Petrocelli, 2005). Messaging awards a wrongdoer to more than once send undermining, bothering, scornful, vulgar messages (Petrocelli, 2005). Rosica had owned up to every one of his wrongdoings when the adjudicator Geraci had driven him “through a reiteration of inquiries concerning his badgering”. Rosica was accused of the most extreme sentence of five years in jail for “cyberstalking, actually following and hassling” and when delivered he would be “under the government probation management for a considerable length of time… and is expected to look for psychological wellness treatment” (Craig, 2018). The proof gathered from past writing recommends that a wrongdoer can experience the ill effects of a behavioral condition that can have the result of suspicion to silly ways of behaving and contemplations (Mullen et al., 1999), this can make sense of why Rosica was told to “look for emotional wellness” after his sentence. What’s more, it is clear the accompanying articulation is valid for this case, “ex-underwear will quite often be the most well-known targets” (Sheridan and Award, 2007).
Hypotheses/typology
Cyberstalking goes under the typology of digital viciousness, which is a web-based conduct that leads or comprises to attack against the prosperity of an individual, or a gathering (Herring, 2002). As, cyberstalking is involved utilizing the web to accumulate individual data about the person in question, this is an infringement of protection making a type of terrorizing prompting at times unequivocal dangers. This can influence the casualties’ inclination, mental and actual prosperity. Ellison and Akdeniz (1998) had developed the term cyberstalking as a web-based badgering, because of the vital part of provocation being a redundant way of behaving. The fundamental component of this case is ‘cyberstalking’ with the association of ‘badgering’. This gets hypothesis by Ellison and Akdeniz (1998), as the provocation of Rosica was monotonous until announced. What’s more, different cases expressed, “seven different ladies have let specialists know that he likewise pestered them along these lines to the casualty in the crook case”.
The main hypothesis that will be talked about is, ‘Space Change Hypothesis (STT)’ (Jaishankar, 2008) which was made to show the causation of violations in the internet. STT is a clarification about the idea of the way of behaving of the person who draws out their non-endlessly adjusting conduct in the physical and the internet. This hypothesis contends that individuals will generally act diversely while moving starting with one space then onto the next.
The subsequent hypothesis is ‘Fluid Advancement’ created by Bauman. In fluid advancement, the web has a transitory worth, the past and future become good for nothing as directions of the mental existence of the people’s present (Bauman, 2009). The explanation and reality will generally separate the subject having the deception of being transcendent, inescapable and unfading (Carabellese et al., 2014). Thusly, on the web, the other can’t be met as a genuine individual however regarding an unfilled simulacrum, comfort and appearance (Baudrillard, 1981), without its own personality characterized in its spatial and transient directions (Cassinari, 2005).
Space Change Hypothesis closes seven key proposes, (1) individual, with curbed criminal way of behaving (in the actual space) have a penchant to carry out a wrongdoing in the internet which they wouldn’t perpetrate in that frame of mind, because of their status and position. Because of Rosica being an ex-cop limited him committing a conduct in actual space, as he needed to keep up with his status and position of being an ex-cop. (2) Character adaptability, dissociative obscurity and the absence of discouragement consider the internet p