Describe how you will test the hypothesis and carry out your analysis. This section describes the data to be used to test the hypothesis, how the student will operationalize and collect data on his/her variables, and the analytic methods that to be used, noting potential biases and limitations to the research approach. It should include: o Identification and operationalization (measurement) of variables. o A sampling plan (i.e., study population and sampling procedures, if appropriate). o Justification of case studies used. o Data collection/sources (secondary literature, archives, interviews, surveys, etc.). o A summary of analysis procedures (pattern-matching, etc.); and o Limitations of study and bias discussion.
The cost of a breach and invasion of privacy by the internet users is on the rise. A lot of this breaches are as a result of malicious digital attacks that is aimed at accessing critical information of organizations, government departments and ministries, institution among others. Therefore,