CYBER SECURITY
5
Month
Task
January
Presentation of research of research proposal for approval.
February
Amending the research proposal and developing data collection tools.
Developing the sample size.
March
Data collection in various organizations and
institutions
April
Data collection.
May
Data analysis and filling of respondents gaps.
June
Documentation of findings and recommendations.
Table I
CYBER SECURITY
6
References
Cyber Security Products and Services. (2016).
Itgovernance.co.uk. Retrieved 25
November
2016, from
http://www.itgovernance.co.uk/cyber-security-solutions.aspx
Dorman, E. (July 01, 2015). Cyber security.
Nuclear Plant Journal, 33, 4.)
EBSCO, (2016).
Ebscovideos.ebscohost.com. Retrieved 26 November 2016, from
http://ebscovideos.ebscohost.com/v/103100997/fbi-chief-talks-terrorism-and-cyber-
crime.htm
CYBER SECURITY
7
Appendix
Research Tools
Questionnaire
To be filled and submitted within the give period.
All participants will be assured of their privacy and no information will be released to the public.
Kindly respond to the questions below.
Questions
What are potential cyber threats in your organization or institutions?
What measures are put in place to ensure that full cyber security integrity is being used?
What are your assessment skills in cyber-attack risks?
How do you implement changes in the organization or institutions after finding out the probable
risks?
What are the key programs used to ensure that cyber security measures are in place?
View
publication stats
View publication stats