In the previous week, you reviewed your research study and how the research questions could be measured with research.? At this point, you are ready to draft sections that will ult
Overview: In the previous week, you reviewed your research study and how the research questions could be measured with research. At this point, you are ready to draft sections that will ultimately lead to IRB application. Directions: Using the appropriate Word version of the IRB application from the IRB and Research Organization/Doctoral Research site, complete the following sections of the appropriate IRB application:
- Human subjects recruited
- Interaction with participants
- Identifiable private data
- Population and sampling
- Subject recruitment materials and procedures
- informed consent form and procedures
Running Head: CYBER RISK AND CYBERSECURITY CHALLENGES 1
CYBER RISK AND CYBERSECURITY CHALLENGES 2
Cyber risk and cybersecurity issues have posed numerous challenges to corporates, learning institutions, the banking industry, the healthcare industry, and government agencies. Since 2020, there has been an exponential increase in cybercrime, which has seen the rise of cybercrime from 15% in 2017 to over 50%, as per 2020 statistics on the economic impacts of cybercrimes. Various studies have shown that between 2014 and 2017, the economic effects of cybercrime cost the world between 445 US dollars and USD 608 billion (Sandhu, 2021). This figure represents $100 billion more than the lowest worldwide cost of cybercrime before 2014. The economic impacts of cybercrime activities are currently $1 trillion, and the trend is worsening.
Based on the above statistics on the rate of increases and the economic impacts of cybercrime, it is, therefore, the objective of my project on the topic selected for the dissertation on cyber risks and cybersecurity challenges to focus on better ways of helping business entities, the healthcare industry, as well as learning institutions, come up with evidence-based strategies of dealing with cyber threats to eliminate major economic consequences that are linked to cyber threats and cybersecurity issues (Sandhu, 2021). Concerning the selected topic- the primary focus of the dissertation will be launching extensive research on the major cyber risks and cybersecurity issues impacting corporates, banks, and healthcare faculties, the types of cyber-attacks that are common, and the increased vulnerabilities of systems to cyber-attacks, provide extensive analysis on the key impacts of cyber-attacks on business and vulnerable organization and as well discuss various strategies that can be employed to reduce cyber risk and cybersecurity issues.
The study will majorly focus on discussing cyber security threats impacting business entities in this digital era. Among the primary areas of focus concerning cyber security risks and threats include risks such as internal risk factors, HTML security issues, Advanced Persistent Threats (abbreviated as APTs), hazards associated with BYOD -bring your device, cyber risk on Cloud computing services, Botnets attacks as well as social engineering. Essentially, studies have shown that a lack of adequate knowledge and understanding of the major types of cybersecurity threats, risk factors, and types of cyber-attacks has progressively led to increasing challenges of cybercrime (Cremer et al., 2022).
This, therefore, means that for business entities and critical industries such as the healthcare industry and banking industry to eliminate currency cyber threats effectively, there is a need to create awareness of the existence of a wide range of cyber risks and hazards along with network theory impacts to equip their employees and IT determinant with necessary tools and knowledge on how to overcome potential cyber threats (Cremer et al., 2022). Additionally, the project will focus on discussing how detrimental cyber threats and attacks can be to corporates concerning legal issues, compliance challenges, and economic impacts to enable corporate to come up with policies and strategies to embrace best cybersecurity practices that protect their systems and IT infrastructure through implementation of efficacious strategy for cybersecurity. The primary objective and goals of the project are to provide recommendations such as the establishment of an incident response plan, progressive cyber security threats assessment and monitoring, creation of network access control, minimization of access to confidential data and systems, as well as the creation of patch management as the approaches for mitigating cybersecurity challenges (Cremer et al., 2022).
References
Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). Cyber risk and cybersecurity: A systematic review of data availability. The Geneva Papers on Risk and Insurance – Issues and Practice, 47(3), 698–736. https://doi.org/10.1057/s41288-022-00266-6
Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). undefined. The Geneva Papers on Risk and Insurance – Issues and Practice, 47(3), 698-736. https://doi.org/10.1057/s41288-022-00266-6
Sandhu, K. (2021). Advancing cybersecurity for digital transformation. Handbook of Research on Advancing Cybersecurity for Digital Transformation, 1-17. https://doi.org/10.4018/978-1-7998-6975-7.ch001
The primary focus of the dissertation will be launching extensive research on the significant cyber risks and cybersecurity issues impacting corporates, banks, and healthcare faculties, the types of cyber-attacks that are common, and the increased vulnerabilities of systems to cyber-attacks, provide extensive analysis on the key impacts of cyber-attacks on business and vulnerable organization and as well discuss various strategies that can be employed to reduce cyber risk and cybersecurity issues. Among the primary areas of focus concerning cyber security risks and threats include risks such as internal risk factors, HTML security issues, and Advanced Persistent. Threats (abbreviated as APTs), hazards associated with BYOD -bring your device, cyber risk on Cloud computing services, Botnet attacks, and social engineering. Essentially, studies have shown that a lack of adequate knowledge and understanding of the significant types of cybersecurity threats, risk factors, and types of cyber-attacks has progressively led to increasing challenges of cybercrime. The primary objective and goals of the project are to provide recommendations such as the establishment of an incident response plan, progressive cyber security threats assessment and monitoring, creation of network access control, minimization of access to confidential data and systems, as well as the creation of patch management as the approaches for mitigating cybersecurity challenges.
,
IRB Application
This application is to be used to request IRB approval. Approval is required prior to engaging in research activities.
1. Principal Investigator Information
Name: Click or tap here to enter text.
ID Number: Click or tap here to enter text.
Email address: Click or tap here to enter text.
2. Study Title: Click or tap here to enter text.
3. Estimated start data of study: Click or tap here to enter text.
4. Upload a copy of your Social and Behavioral Research Basic Course CITI training certificate.
5. Background: (Why is this study important? What problem are you trying to solve?)
Cite at least 2 references.
Click or tap here to enter text.
6. Research Questions:
Research questions must align with the study background, study type, and the data collection instrument. Minimum of 2 questions.
Click or tap here to enter text.
Research Questions Examples
7. Provide a summary of your Research Procedures:
Click or tap here to enter text.
Research Procedures, Data Collection, and Data Analysis Example
8. Potential Risks and Benefits: There is always at least minimal risk associated with participating in any research. Please describe the potential risks that the study poses to subjects, whether seen or unforeseen, including physical, social, psychological, legal, or other risks. Describe how these risks will be minimized or mitigated. Describe the individual or overall benefits the study may offer.
Click or tap here to enter text.
Potential Risks and Benefits
Risks and Benefits text box should match information on the uploaded Informed Consent. Must state at least minimal risks. Include risks associated with your study.
9. Will human subjects be recruited for this study?
Yes, if student is sending the link to participants or contacting them for interviews, making the study= Expedited. No, if link is being forwarded to participants by a third party, data is being collected by third party, or archival or de-identified secondary data is being used, making the study = Exempt.
☐ Yes
☐ No
10. Interaction with Research Participants: Will the researcher be collecting data by directly interacting with the participants (electronic, paper, or in person)?
Yes if collecting data directly or by electronic or paper means. No if secondary or archival data.
☐ Yes
☐ No
11. Identifiable Private Data: Will identifiable private information be collected from existing records (medical records, assessment data, or other data sources)?
Yes, if collecting any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means, including name, address, social security number or other identifying number or code, telephone number, email address, etc.
☐ Yes
☐ No
12. Population and Sampling Procedure: Describe the demographic characteristics of the study population, including the sampling method, minimum sample size, and how adequate sample size was determined.
For quantitative, include G*Power calculation and information.
Click or tap here to enter text.
Population and Sampling Procedures Examples
13. Subject Recruitment Materials and Procedure: Describe the process of identifying and recruiting subjects for the research activities. Upload a copy of any recruitment material, such as flyers, advertisements, cover letters, etc. Specify any inclusion and exclusion criteria. The recruitment materials must be in language understandable and comprehensible to the participant and/or the legally authorized representative. This is not required for secondary/archival data studies where no live subjects will be recruited.
Include text of flyers to be posted on social media and emails or letters to be sent to agencies and potential participants.
Click or tap here to enter text.
Recruitment Examples
14. Informed Consent Form and Procedure: Describe the process of obtaining informed consent from participants prior to data collection. The informed consent form must be in a language understandable and comprehensible to the participant and/or the legally authorized representative. If using an online survey, informed consent should be included on the introductory page. Upload a copy of your Informed Consent form here.
All sections on the Informed Consent template must be included. Remove UC logo, red text, and highlights if still using old template. Include "Must be at least 18 years of age" as Inclusion Criteria.
Click or tap here to enter text.
Informed Consent Example
15. Data Collection: Specify the data collection process that will be used. If a survey is sent, who sends it. If data are provided who provides it? If interviews will be conducted, where and when? This must be clear enough that someone else could follow your steps and replicate the study.
Click or tap here to enter text.
16. Data Collection Instrument and Permission to Use: Provide instrument to be used for data collection (i.e., survey, questionnaire, interview guide, focus group guide, etc.) and permission, if applicable. For use of pre-validated survey scales or other instruments, copyright release/permission to use must be provided. If the instrument is publicly available for research purposes, evidence of the public availability must be provided. For electronic surveys or questionnaires to be implemented, the live URL to the instrument must be provided and included in the recruitment notice. Your Informed Consent document must be page 1 of your survey or questionnaire. If using an existing survey, explain reliability and validity information from the original authors. If you are developing your own survey or questionnaire, you must complete the pilot-test application and complete that process before applying for IRB approval for your study. If you will be conducting interviews or focus groups, you must complete the field-test application and complete that process before applying for IRB approval for your study.
Must upload permission to use each data collection instrument or information showing it is available for public use. Must upload field test or pilot study results if developing instrument. Data collection URL must be for the actual survey that will be used in the study. Informed Consent must be the only information on page 1. If "No" is chosen, it must exit the person from the survey. If no URL is needed for your study, insert the UC URL in the box.
Click or tap here to enter text.
Survey Example Permission to Use Survey Instrument Example
17. Site Permission or Data Use Permission: Evidence of site permission for data collection is required. Site Permission may be an email, formal letter, or an IRB approval from the organization, depending upon their requirements. Data Use Permission/Agreement is used when an organization is providing/sharing an existing, non-public data set with the researcher. For publicly available data, provide evidence of the public availability of the dataset. If recruiting using social media closed-groups (Facebook, Linkedin, etc.), include permission from the group administrator.
Must upload permissions for all sites from which data will be collected.
Click or tap here to enter text.
Site Permission Example Data Use Example
18. Data Analysis: How will you analyze your data? For example, how will you measure your independent and dependent variables? What survey items measure the construct and what statistical analysis (if applicable) will you use?
Statistical tests must match wording of research questions. Include independent variables, dependent variables, and analysis methods for each research question.
Click or tap here to enter text.
19. Study Method:
☐ Quantitative
☐ Qualitative
☐ Mixed Methods (Requires program director approval.)
Mixed Methods and Applied Research require program director permission. An email screenshot will suffice.
☐ Applied Research (Requires program director approval.)
20. Study Type: (Check the box and click on the title type of application you are selecting to complete the appropriate category)
Exempt if student is having no contact with participants.
Expedited if student is having contact with participants. Full if protected populations are involved in the study.
☐ Exempt
Exempt Category: Complete this section if your application is considered as exempt.
If Exempt study, which category describes your study?
☐ Research, conducted in established or commonly accepted educational settings, that specifically involves normal educational practices that are not likely to adversely impact students’ opportunity to learn required educational content or the assessment of educators who provide instruction. This includes most research on regular and special education instructional strategies, and research on the effectiveness of or the comparison among instructional techniques, curricula, or classroom management methods (§46.104(d)(1)).
☐ Research that only includes interactions involving educational tests (cognitive, diagnostic, aptitude, achievement), survey procedures, interview procedures, or observation of public behavior (including visual or auditory recording) when at least one of the following criteria is met (§46.104(d)(2)): See (i), (ii), (iii).
☐ Research involving benign behavioral interventions in conjunction with the collection of information from an adult subject through verbal or written responses (including data entry) or audiovisual recording if the subject prospectively agrees to the intervention and information collection and at least one of the following criteria is met: §46.104(d)(3)(i) and A, B, C.
☐ Secondary research for which consent is not required: Secondary research uses of identifiable private information or identifiable biospecimens, if at least one of the following criteria is met §46.104(d)(4): See (i), (ii), (iii). (iv).
☐ Study involves no recruitment of human subjects and involves only deidentified data.)
Expedited Categories – Complete this section if your application is considered as expedited.
If Expedited study, which category describes your study?
☐ Category 5: Research involving materials (data, documents, records, or specimens) that have been collected, or will be collected solely for non-research purposes (such as medical treatment or diagnosis).
☐ Category 6: Collection of data from voice, video, digital, or image recordings made for research purposes.
☐ Category 7: Research on individual or group characteristics or behavior (including, but not limited to, research on perception, cognition, motivation, identity, language, communication, cultural beliefs or practices, and social behavior) or research employing survey, interview, oral history, focus group, program evaluation, human factors evaluation, or quality assurance methodologies. (NOTE: Some research in this category may be exempt from the HHS regulations for the protection of human subjects. 45 CFR 46.101(b)(2) and (b)(3). This listing refers only to research that is not exempt.)
☐ Category 8: Continuing review of research previously approved by the convened IRB as follows:
a. Where (i) the research is permanently closed to the enrollment of new subjects; (ii) all subjects have completed all research-related interventions; and (iii) the research remains active only for long-term follow-up of subjects; or
b. Where no subjects have been enrolled and no additional risks have been identified; or
c. Where the remaining research activities are limited to data analysis.
☐ Category 9: Continuing review of research, not conducted under an investigational new drug application or investigational device exemption where categories two (2) through eight (8) do not apply but the IRB has determined and documented at a convened meeting that the research involves no greater than minimal risk and no additional risks have been identified.
Full/Non-Exempt Application – Complete this section if your application is considered as full/non-exempt.
Will your research involve one of the following protected groups? If you check any of the categories below, you will need to complete the remaining sections of the full/exempt application.
☐ Children
☐ Persons with impaired decision-making capacity
☐ Prisoners
FULL APPLICATION- Research involving children as subjects
The human subject research regulations define "children" as: "Children" are persons who have not attained the legal age for consent to treatments or procedures involved in the research, under the applicable law of the jurisdiction in which the research will be conducted (45 CFR 46.402(a)).
In Kentucky, a child is an individual who is less than 18 years of age unless the individual has been legally emancipated. Some Federal agencies and other states define children differently. If the study is to be funded by a Federal agency, that agency’s definition applies; if a study is to be conducted outside Kentucky, that state’s definition applies.
1. Will this study involve children as subjects?
☐ No (skip remainder of this section)
☐ Yes (complete all items in this section)
2. Suitability of Subjects: Explain why children are suitable subjects for this research.
3. Previous Research on Adults: Has this research previously been conducted with adults as subjects?
☐ No ☐ Yes (respond to 3.a. below)
a. Explain indications that the proposed research will benefit or at least not be harmful to the children.
4. Number of Children Subjects: Provide a justification for the number of children proposed for enrollment in the project.
5. Parent/Guardian Permission Process: Describe procedures for soliciting parent/guardian permission. If the study involves greater than minimal risk, the permission of both parents/guardians may be required.
6. Assent Process: Describe procedures for soliciting the assent of the children, following permission from the parents/guardians.
Click and type.
7. Understandable Language: Describe what efforts have been made to present information about the study in a language that is understandable to the children who will be recruited (i.e, informational documents, recruitment flyers, assent forms, data collection instruments).
Click or tap here to enter text.
8. Wards as Subjects: Will the study involve children who are wards of the State or any other agency, institution, or entity?
☐ No ☐ Yes (respond to 8.A. and 8.B. below)
A. Research Classification: The use of wards as subjects in research is permissible in only the following two situations. Indicate which classification below applies to the proposed research.
☐ The proposed research is related to the subjects’ status as wards of the state.
☐ The proposed research is to be conducted in schools, hospitals, or similar settings in which the majority of children involved in the study are not wards.
B. Ward Advocate: An advocate must be appointed for each child who is a ward, in addition to any other individual acting on behalf of the child as guardian or in loco parentis. One individual may serve as an advocate for more than one child. The advocate(s) must have the background and experience to act in, and agree to act in, the best interests of the child for the duration of the child's participation in the research and may not be associated in any way with the research, the investigator(s), or the guardian organization. Please explain how these ward advocate requirements will be met.
FULL APPLICATION- Research involving persons with impaired decision-making capacity
When a prospective research participant lacks the ability necessary to understand and use information relevant to an informed consent process, additional precautions and protections are required.
1. Will the study involve subjects who have impaired decision-making capacity?
☐ No (skip remainder of this section)
☐ Yes (respond to all items in this section)
2. Suitability of Subjects: Individuals with impaired decision-making capacity should be used as research subjects only in situations where they are the only population who can provide the data needed for the study and only when the potential risks are balanced with expected benefits. Explain why individuals with impaired decision-making capacity are suitable subjects for this research.
Click or tap here to enter text.
3. Subject Advocate: What procedures are in place to allow an advocate to assist subjects in navigating the research process?
Click or tap here to enter text.
4. Competency to Consent: Describe who will determine individuals’ competency to consent and the criteria to be used in determining competency (i.e., use of standardized measurements, consultation with qualified professionals, etc.)
Click or tap here to enter text.
5. Consent for Individuals Incapable of Consenting on Their Own Behalf: Explain how you will identify who is authorized to give legally valid consent on behalf of any individual(s) determined to be incapable of consenting on their own behalf.
Click or tap here to enter text.
6. Expectations, Obligations, and Authority of Legally Authorized Representatives: Explain the expectations, obligations, and authority of the legally authorized representative for each subject and describe how this information will be conveyed to the representative (i.e., through a written information sheet).
Click or tap here to enter text.
7. Assent: Explain the criteria you will use to determine when assent is required for subjects who are not competent and describe the assent process to be used with these subjects.
Click or tap here to enter text.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.