This week you synthesize your review of scholarly literature and address the theoretical foundation or practice orientation for your study. Let’s discuss how
Topic I am currently doing my study on!!
Cybersecurity ransomware attacks
I JUST PUT A LINK FROM LAST WEEK DISCUSSION IT WAS NOT REQUIRED I USE IT BUT I POSTED IT JUST IN CASE SOMETHING IN IT WAS USEFUL!1
INSTRUCTIONS!!
Relating Purpose to Proposed Study
This week you synthesize your review of scholarly literature and address the theoretical foundation or practice orientation for your study. Let's discuss how your proposed study benefits the field. For this week's discussion, choose one of the following for your post:
- Discuss how your study is grounded in your field and the problem it addresses. Which new or different aspect of the problem does your proposed study address? How does this motivate you to continue your work?
- Share how your study results may address the problem. Are you finding anything in your work that particularly surprises you? What will practitioners do better once they have the insights from your project?
- As we wrap up this week, share resources from the course, the library, or your peers that were most relevant and immediately useful to your project.
I faced a few challenges while conducting my literature review of cybersecurity, especially ransomware attacks and organizational response strategies. It was time-consuming, especially trying to filter through the dozens of recent and relevant studies in the literature. Most identified sources were outdated or not precise enough to pinpoint the specific organizational actions when facing ransomware. Also, some articles obtained could only be accessed with a subscription service, making it difficult to obtain potentially important information (Zuniga, 202). Another difficulty was finding literature combining technical cybersecurity and organizational risk management perspectives. This overlap is significant for creating broader solutions; however, such approaches are often divided into technology or management categories, which makes identifying more complex interdisciplinary research more challenging. To address these issues, I adjusted my search terms. I limited the research to articles published in the past five years and included terms such as “ransomware response frameworks” and “organizational cybersecurity strategies.” By using databases such as PubMed, IEEE Xplore, or ProQuest, I gained access to high-quality, peer-reviewed articles. I also used institutional connections to circumvent many paywalls in various articles. There was concern involving identifying published studies that are easily understandable to non-specialists and evaluating how organizations train their employees to prevent ransomware attacks. To deal with the above, I will approach academic forums for assistance, consult with instructors, and talk to peers in the course to avoid losing sight of the fact that the literature base I have established for my project should be up-to-date and diverse. References Zuniga, H. (2022). Accessibility and E-resources: Why it matters and what you can do. The Serials Librarian, 82(1-4), 103-108.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
