Engineering - It

Read Complete Research Material

ENGINEERING - IT

Foundation Degree in Security and Risk Management

March 2012 Cohort

Module 8

Ogunmuyiwa Michael

Reference Number: 119054176

Submitted on

Word Count: 3068

By

1.Proposal to Conduct the Research4

1.1 Research Design and Elements5

2.Research Aims5

3.Relevant Theories6

Schultz Detection Theory7

Space Transition Theory7

4.Proposal to Employ Research Method8

Quantitative Method9

Potential Problem10

Qualitative Method10

Potential Problem10

5.Internal and External Validity11

6.Quantitative Questions12

Answer 112

Answer 212

Answer 313

7.Qualitative Questions13

8.1 Questionnaire13

References15

Design Exercise: Computers and Crime (Proposal)

With the increasing number of multinational companies and global businesses, the demand for technological innovations has become a fundamental pillar for commencement and succession of cost effective businesses. IT department of every company play an important role in bringing a number of technical inventions. In this context, internet is the key component of IT department that has gained popularity and caused an interest in computer crime, privacy, and ethics. Some of the common and widely occurred computer crimes include identity theft, lost of credit card details by posting of credit card numbers on chat rooms, and child pornography websites. Out of these crimes, O'Donnell & Milner (2007, n.d.) have emphasised on child pornography. It has been legally allowed in some countries, however the same has been forbidden in others. The exploration of sexual abuse with children has been signified as a considerable societal issue till the end of the 1970s, highlighted as an indication of disappearance. In history, this problem has been ignored by qualified experts, who were traditionally sightless to its subsistence. This aspect emerged in the era when the expression “child abuse” that has until then referred to physical mistreatment or overlook, turned into iimpossibly entwined with concepts of sexual intrusion. In contrast to this historical situation, government's increased regulations have significantly declined the commercial creation and delivery of child pornography.

Others computer crimes can be done on small scale, resulting in less influence. On the other side, vulnerabilities with information systems cover large frequency affects than just personal losses. Information systems designed with the help of computers in the companies are vulnerable to physical attacks, natural disasters, and electronic hacking. With the increase in significance and scale of computer crimes, great awareness is being given on prosecuting and apprehending criminals. In contrast, there is also a constructive factor to the growing use of technological advancement by offenders, which include the engagement of computers in crime. (Casey, 2011, pp. 5).



Proposal to Conduct the Research

In order to conduct a comprehensive research that provide pragmatic and effective results and recommendations in the end, the researcher will employ considerable data from a design exercise that illustrates a case of a large retail pharmaceutical company which is increasingly moving over to internet selling. The researcher depicts a role of new IT security manager, who has been brought in the company because a serious incident led to the company's website freezing for five working days in the previous quarter. This led to a reduction in sales during that period. News of this event also seems to have discourages customers from using the company's website more generally. Consumer confidence may also have been affected by the news that another company ...
Related Ads