Saturday, December 7, 2019

Business and Statistic Research Management

Question: Discuss about the Business and Statistic Research Management. Answer: Problem Statement E- business is becoming very common nowadays in Australia.The main purpose of the research is to identify the major problems related to the security issues. These issues are defined in respect to the E- Business. How to prevent E- Business from the security and Hacking issues. Literature Review While doing the E- Business, the security issues are getting very common. According to the Tech Girl Caurtney Kaufman, there are seven common problems with the small, medium and big business (Accent Computer Solutions, 2015). To manage the business, it is essential to identify the risk and solve it on priority. Some of the common risks defined by the author are the integration issues, disaster issues the recovery issues, security risk and lack of strategic planning and many more. Similarly, the article mentioned by the decision web design, the author also defines the most prominent issues which can affect the Business. The wide range of cause is defined, which are also affecting the actual business process. The author also defines the common consequences related to the security issues. These are impact of the virus on the website, insecure online payments, attack of malicious virus on the blogs the articles related to the business in order to identify their personal information. By identifying all this literature, the research aspects may become easier Variable and Hypothesis The hypothetical approach is mainly based on the variable. The variable is also categorized into two sections which are named as the dependent and independent variables. The hypothetical approach is also identified in two types which are named as the qualitative and quantitative approach. Both of these approaches are helpful in identifying the causes related to the security and hacking issues. The main purpose of the hypothetical approach is to focus on the collection of the data.(Hamel, 2016). Operational Definition and Management Operational definition and management is the necessary step by which the identification of the ongoing research can be defined in an appropriate manner. The sequence of the research and its existing process are essential to carry in a definite manner. To manage all the aspects, the operational definition and management is required. Other than this, the management of the data collection and data analysis is also identified with the help of the operational management (Ladan, 2012). Research Design and Methodology Research design and methodology is considered as the most prominent aspect of the research method. With the help of the research methodology, the suitable output can be generated easily. The two methods of research methodology are defined which are considered as the qualitative research analysis and the quantitative research analysis. From both these techniques, the most suitable technique will be selected for the research work. The ethical research methodology is considered as the different type of research methodology which is helpful in researching in an ethical manner. The NHMRC is responsible for introducing the concept of the ethical research methodology. There is also one different type of research methodology which is known as the ethical research methodology. In reference to the research work, the most suited method are the quantitative analysis and the ethical research work. Both these types of research work will be helpful in providing the appropriate output (Lord, 2002). Sampling and data analysis Sampling is the most important aspect of the research process. The suitable sampling method will be helpful in providing the appropriate feedback for the research work. The sequential collection of the data is known as the data collection or sampling method. The relevant questionnaire is prepared which is helpful in providing the appropriate answers. After completing the sampling work, the analysis of the data is the next step. The data analysis is an aspect through which the suitable study of the data can be done. The two methods are defined for the analysis of the data which is known as the primary data analysis and secondary data analysis. The primary data analysis is the pictorial representation by which the issues related to the E- Business in Australia are being identified (Federation University Australia, 2016). Other than this, the secondary data analysis will be helpful in defining the aspects with the help of the internet and the data available in the article and journals. The primary data analysis for the research topic is defined by considering the data of approximately 100 Consumers. Questionnaire Categorize the list of traders who uses the concept of E-Business? Retailers Wholesalers Traders Others What are the common issues which affect the E- Business? Loss of the Data Data Integrity Data Authentication Others Define the major intentions of Hackers to hack the data? Stealing the confidential data from the organization To hack the account information To steal the business strategy Others What are the methods by which the hacking issues can be avoided? By awareness By security By identifying advantages and disadvantage Other What are the methods by which the E- Business can be protected? By suitable Firewalls By encrypting the data By installing suitable antivirus Other Conclusion and Recommendations By observing the research aspects, it is well understood that the security issues continuously threatening the existing business of traders in Australia. In fact, some businesses are also influenced by the inappropriate security aspects adapted by the organizations. There are various recommendations provided to secure the data from the malicious virus, worms and the Trojan horses. After identifying the causes, the suitable security aspects should be generated in an appropriate manner. The social awareness and the development of the suitable security aspects should also be defined, so that the issues related to the E- Business can be solved easily. Bibliography Accent Computer Solutions, 2015. 7 Most Common Technology Problems for Small Businesses. 7 Most Common Technology Problems for Small Businesses, 13 April. Federation University Australia, 2016. Human research ethics. [Online] Available at: https://federation.edu.au/research/research-support/ethics/human-ethics Hamel, G., 2016. E-Business Security Concerns. E-Business Security Concerns, Available at: https://smallbusiness.chron.com/ebusiness-security-concerns-44182.html Ladan, M. I., 2012. E-Business security challanges, Available at: https://sdiwc.net/digital-library/download.php?id=00000495.pdf Lord, P., 2002. Managing E-Business Security Challenges: Oracle, Available at: https://www.cgisecurity.com/database/oracle/pdf/9iR2hisec.PDF

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.