Write a 2-page report (minimum 600 words) APA format (12 point font, 1-inch margin all around) in which you describe and develop a literature map of the research studies on the cybersecurity topic you described in the paper you did ( Added in attachments).Include an Introduction and Conclusion. Your graphic should include lines from the proposed study to branches of studies on the map so that a reader can easily see how yours will extend existing literature.The paper should be properly incited using Scholarly articlesThe Threats of Phishing to Private Companies in the UAE
Social engineering attacks are considered as one of most dangerous forms of
security and privacy attacks as they are technically oriented to psychological
manipulation and are growing in frequency, infinitely (Airehrour et al., 2018). This is an
important issue with how data involves almost everything in today’s digital world—
personal information to bank accounts and addresses; thus stressing the value of data
privacy (Lohani, 2019). One type of social engineering attack is phishing. Phishing can
be defined as method of attempting to acquire personal information through deceptive emails and websites (Fruhlinger, 2020). In the UAE, different companies are increasingly
becoming victims of phishing, wherein email malware attacks have doubled more than
the global rate or average (Cherrayil, 2019). Such incident is considered alarming and can
be subject to empirical study, with how precautionary measures against phishing can be
developed.
Methods
The proposed research method is qualitative research, in order to accomplish the
following research goals:
•
To determine types or kinds of phishing attacks among private companies in the
UAE;
•
To identify the effects of phishing in private companies in the UAE; and
•
To recognize potential measures and preventive or mitigation activities against
phishing in private companies in the UAE.
Research Worldview
There are four known research worldviews: positivist or postpositivist,
constructivist or interpretivist, advocacy or participatory, and pragmatist. Among these
four, the proposed research will use the constructivist or interpretivist worldview.
According to Creswell (2010), social constructivists assumed that individuals seek
understanding of the world they live in, through the development of subjective meanings
of their experiences. Such meanings could be directed to certain objects or things. Also,
these meanings are varied and therefore urge the researcher to identify complex views,
rather than merely narrowing the meanings into certain categories or ideas. More so, the
goal of the research under the constructivist or interpretivist view is to rely as much as
possible on the participants’ views of the circumstances or situation being studied. The
researcher as well uses open-ended questions or general or broad questions for
participants to construct meanings.
Research Design
Of the three research designs, the proposed research will use the qualitative
research design. According to Pathak et al. (2013), the qualitative research design focuses
on understanding the research queries as humanistic or idealistic approach. It is used in
order to understand the attitudes, behaviors, beliefs, experiences, and interactions. It
produces non-numerical data, compared with the numerical information acquired through
the quantitative research approach. More so, qualitative research is an “iterative process
that improves understanding of the scientific community by making new significant
distinctions, by getting closer to the phenomenon studied” (Aspers & Corte 2019, p.139).
Research Method
The constructivist or interpretivist worldview serves as the foundation of the
research design to be used—qualitative research and secondary data analysis as data
collection method. Secondary data analysis is the analysis of existing data that were
already published or collected by others (Donnellan & Lucas, 2013). Through this
method, the researcher will collect related literatures and research studies about social
engineering to answer or address the research goals. After gathering the diverse data from
secondary materials like books, journals, magazines, reports and conferences, among
others, themes that will answer the research questions will be developed. Using the
secondary research method saves time and costs, while exploring wide variety of data.
References
Airehrour, D. et al. (2018). Social Engineering Attacks and Countermeasures in the New
Zealand Banking System: Advancing a User-Reflective Mitigation Model.
Information, 9(110), 1-18.
Aspers, P. & Corte, U. (2019). What is Qualitative in Qualitative Research. Qual Sociol,
42, 139–160.
Cherrayil, N.K. (2019). Cybercrime activity soars in UAE. Gulf News. Retrieved from
Creswell, J.W. (2010). Research Design: Quantitative, qualitative and mixed methods.
Thousand Oaks, CA: Sage.
Donnellan, M.B. & Lucas, R.E. (2013). “Secondary data analysis.” In Todd D. Little
(Ed.), The Oxford Handbook of Quantitative Methods in Psychology: Vol. 2:
Statistical Analysis. Oxford, UK: Oxford University Press.
Fruhlinger, J. (2020). What is phishing? How this cyber-attack works and how to prevent
it? Retrieved from < https://www.csoonline.com/article/2117843/what-isphishing-how-this-cyber-attack-works-and-how-to-prevent-it.html>
Lohani, S. (2019). Social Engineering: Hacking into Humans. International Journal of
Advanced Studies of Scientific Research, 4(1), 1-10.
Pathak, V., Jena, B., & Kalra, S. (2013). Qualitative research. Perspectives in Clinical
Research, 4(3), 192.
Literature Map (1)
Criteria
Ratings
Pts
Submitted by deadline
50.0 pts
Full Marks
0.0 pts
No Marks
50.0 pts
2 pages, 12 point font, double spaced, 1 inch margin
25.0 pts
Full Marks
0.0 pts
No Marks
25.0 pts
References in APA style
25.0 pts
Full Marks
0.0 pts
No Marks
25.0 pts
Spelling and Grammar
25.0 pts
Full Marks
0.0 pts
No Marks
25.0 pts
Intro/Conclusion clearly stated
150.0 pts
Full Marks
0.0 pts
No Marks
150.0 pts
Literature Map
150.0 pts
Full Marks
0.0 pts
No Marks
150.0 pts
Peer-reviewed references identified
75.0 pts
Full Marks
0.0 pts
No Marks
75.0 pts
Purchase answer to see full
attachment