Cybersecurity and Quantitative Research
Introduction
Cybersecurity is an emerging field, offering several new theories and factors in determining the latest cyber threats. These theories/factors include formulating new procedures, technologies, and research to counter the global information-technology movement and provide security that cannot be compromised by outside sources. However, these efforts must understand cybersecurity as a reactive field to computer science, based on social distinctions, and a field not limited to any research method, namely, quantitative, or qualitative research. Regarding methods of quantitative research, experimental, quasi, and nonexperimental design, we should consider all 3 for a dissertation study. This article will explore those 3 methods in relation to cybersecurity.
Discussion
[1] A classic quantitative experimental design would benefit cybersecurity research by observing randomized observational conditions that could illustrate conditions for hackers, attacks, or general cyber threats. I believe that this design would offer a quick, efficient, and plausible research design to effectively produce findings. For instance, observational conditions can allow conclusions to be drawn that allows the assignment of rank for threats. In addition, by using this method, negative findings are beneficial as they allow for the filtering of abnormal threats. How? Well, the threat can be identified outside the normal bell curve (Figure 1.1) which can illustrate the necessity to mitigate the threat. Or the contrary, show how the threat is minimal compared to those within the normal curve, therefore lending priority to other threats.
Figure 1.1 Normal Distribution Curve
[2] The quasi-Experimental design offers strong casual inferences through planning and procedural observations. An extensive longer study would benefit this research, by using the method of the nonexperimental design, we could essentially map major attacks, attackers, social behaviors, technical skills/education, motivation, and other factors to show almost a career path for attackers. Thus, showing social conditions that breed cyberthreats. However, this is optimistic, a long study, and contingent on the researcher’s technical knowledge of information systems.
[3] Nonexperimental design can be used to look at cybersecurity incidents and determine different factors from attackers. For instance, by looking at the relationships between preexisting groups, we can segment nationality, race, net worth/debt/annual income, and education level. Doing so can reveal more detailed questions like how this attack was possible by this person, probing for questions regarding the class, education/technical background, and more.?
领英推荐
Conclusion
Overall, I believe that all 3 quantitative research design options are appropriate for a cybersecurity study as this field is based in the demand for research and implementation of solutions. Now considering this study, the research process, and dissertation timeline, I believe that a permissible approach would be a classical quantitative experiment or a nonexperimental design. The reasoning lies in that I can observe new trends or track the existence of already researched ones within the realm of cybersecurity.?
Reference:
[1] Edmonds, W. & Kennedy, T. (2017). Quantitative methods for experimental and quasi-experimental research. In?An applied guide to research designs?(pp. 29-34). SAGE Publications, Inc, https://www.doi.org/10.4135/9781071802779
[2] Given, L. M. (2008).?The SAGE encyclopedia of qualitative research methods?(Vols. 1-0). Thousand Oaks, CA: SAGE Publications, Inc. doi: 10.4135/9781412963909
[3] Salkind, N. J. (2010).?Encyclopedia of research design?(Vols. 1-0). Thousand Oaks, CA: SAGE Publications, Inc. doi: 10.4135/9781412961288
Helping Businesses Recruit & Hire the Best Global Talent – "If It Can Be Done Remotely, It Can Be Done Globally"
4 个月Thanks for sharing David, just followed!