Cybersecurity and Quantitative Research

Cybersecurity and Quantitative Research

Introduction

Cybersecurity is an emerging field, offering several new theories and factors in determining the latest cyber threats. These theories/factors include formulating new procedures, technologies, and research to counter the global information-technology movement and provide security that cannot be compromised by outside sources. However, these efforts must understand cybersecurity as a reactive field to computer science, based on social distinctions, and a field not limited to any research method, namely, quantitative, or qualitative research. Regarding methods of quantitative research, experimental, quasi, and nonexperimental design, we should consider all 3 for a dissertation study. This article will explore those 3 methods in relation to cybersecurity.

Discussion

[1] A classic quantitative experimental design would benefit cybersecurity research by observing randomized observational conditions that could illustrate conditions for hackers, attacks, or general cyber threats. I believe that this design would offer a quick, efficient, and plausible research design to effectively produce findings. For instance, observational conditions can allow conclusions to be drawn that allows the assignment of rank for threats. In addition, by using this method, negative findings are beneficial as they allow for the filtering of abnormal threats. How? Well, the threat can be identified outside the normal bell curve (Figure 1.1) which can illustrate the necessity to mitigate the threat. Or the contrary, show how the threat is minimal compared to those within the normal curve, therefore lending priority to other threats.

No alt text provided for this image

Figure 1.1 Normal Distribution Curve

[2] The quasi-Experimental design offers strong casual inferences through planning and procedural observations. An extensive longer study would benefit this research, by using the method of the nonexperimental design, we could essentially map major attacks, attackers, social behaviors, technical skills/education, motivation, and other factors to show almost a career path for attackers. Thus, showing social conditions that breed cyberthreats. However, this is optimistic, a long study, and contingent on the researcher’s technical knowledge of information systems.

[3] Nonexperimental design can be used to look at cybersecurity incidents and determine different factors from attackers. For instance, by looking at the relationships between preexisting groups, we can segment nationality, race, net worth/debt/annual income, and education level. Doing so can reveal more detailed questions like how this attack was possible by this person, probing for questions regarding the class, education/technical background, and more.?

Conclusion

Overall, I believe that all 3 quantitative research design options are appropriate for a cybersecurity study as this field is based in the demand for research and implementation of solutions. Now considering this study, the research process, and dissertation timeline, I believe that a permissible approach would be a classical quantitative experiment or a nonexperimental design. The reasoning lies in that I can observe new trends or track the existence of already researched ones within the realm of cybersecurity.?

Reference:

[1] Edmonds, W. & Kennedy, T. (2017). Quantitative methods for experimental and quasi-experimental research. In?An applied guide to research designs?(pp. 29-34). SAGE Publications, Inc, https://www.doi.org/10.4135/9781071802779

[2] Given, L. M. (2008).?The SAGE encyclopedia of qualitative research methods?(Vols. 1-0). Thousand Oaks, CA: SAGE Publications, Inc. doi: 10.4135/9781412963909

[3] Salkind, N. J. (2010).?Encyclopedia of research design?(Vols. 1-0). Thousand Oaks, CA: SAGE Publications, Inc. doi: 10.4135/9781412961288

Nick Esquivel

Helping Businesses Recruit & Hire the Best Global Talent – "If It Can Be Done Remotely, It Can Be Done Globally"

4 个月

Thanks for sharing David, just followed!

回复

要查看或添加评论,请登录

David Piro的更多文章

  • Cybersecurity in Qualitative Trends

    Cybersecurity in Qualitative Trends

    Written by David Piro. Submitted to Colorado Technical University.

  • Ethics in Research

    Ethics in Research

    What is Ethics in Research Ethics for research is very important for doctoral research, as this is the step before…

  • Evidence-Based Writing for Doctoral Research

    Evidence-Based Writing for Doctoral Research

    Evidence-Based Writing for Doctoral Research After reflecting on the evidence presented to me and the experience…

  • Evidence-Based Writing

    Evidence-Based Writing

    David Piro Evidence-based writing is the literature or narrative format that attempts to communicate a claim that the…

  • Dissertation Reflection

    Dissertation Reflection

    This reflection will provide a summary of the initial thoughts related to the knowledge, skills, and tools that will be…

  • Useful Side Hustles

    Useful Side Hustles

    David Piro Introduction Please read this as a suggestive guide to allow additional income for professionals at all…

  • Reference Citation Management Software

    Reference Citation Management Software

    By David Piro Before we begin our discussion, comparing and contrasting reference citation management software, I would…

  • Problems and Being Critical as Professionals

    Problems and Being Critical as Professionals

    By David Piro A problem statement is a description or declaration that problematizes an issue with a background that…

  • Research, Science and Freire

    Research, Science and Freire

    Regarding research, I obviously find value in this skill. My interest is that with researching, this provides a chance…

  • Defining the Scholar-Practitioner

    Defining the Scholar-Practitioner

    Written by David Piro. 7/10/2020 What is it? A scholar-practitioner is a role that we step into, but for one, we can’t…

社区洞察

其他会员也浏览了