While You Are In The Infancy Of Thinking About Your Disserta
While You Are In The Infancy Of Thinking About Your Dissertation Topic
While you are in the infancy of thinking about your dissertation topic, it helps to begin with the end in mind. During your literature review, you will uncover a gap in the scholarship on your proposed topic. While this gap may be content or methodological-specific, it is critical to think about the type of methodology your study will employ as you begin your search. Therefore, you will review the University of the Cumberland’s doctoral research handbook for approved research designs. You will not be “locked in” to your choice until your IRB is approved in DSRT 839, but you should have a general idea of how you will collect data on your proposed topic.
Paper For Above instruction
My proposed dissertation topic focuses on cybersecurity, an increasingly critical field in protecting digital infrastructure and sensitive information against malicious cyber threats. The research aims to explore the effectiveness of different cybersecurity protocols in organizational settings, with an emphasis on risk mitigation strategies and security policy implementations. Given the rapid evolution of cyber threats, understanding the most effective methods to safeguard information assets remains a vital area of investigation.
Theories related to cybersecurity encompass various frameworks, including the Information Security Theory and the Theory of Planned Behavior. The Information Security Theory, derived from the broader information systems security literature, emphasizes organizational policies, user behaviors, and technical controls as pivotal factors in maintaining security (Bach et al., 2017). Additionally, the Theory of Planned Behavior can be employed to understand user compliance with cybersecurity protocols, highlighting the influence of attitudes, subjective norms, and perceived behavioral control on security practices (Ajzen, 1992). Combining these theories allows for a comprehensive understanding of both technical and human dimensions of cybersecurity management.
This research topic aligns with the goals of my academic program, which emphasizes leadership and strategic management within organizations. By exploring cybersecurity strategies, the study aims to contribute to organizational resilience, a key competency in my field. Developing expertise in cybersecurity policies equips practitioners to lead digital transformation initiatives responsibly and ethically, ensuring that technology enhances organizational objectives without compromising security.
Based on the review of the approved research designs detailed in the University of the Cumberland’s doctoral research handbook, I believe a mixed-methods approach will suit my study. Quantitative data collection will involve surveys administered to IT professionals and organizational leaders to assess perceptions of security protocols' effectiveness. Qualitative data will be gathered through semi-structured interviews to gain deeper insights into organizational practices and challenges in implementing cybersecurity measures. The survey will be distributed electronically via organizational email lists, and interviews will be conducted via video conferencing platforms, ensuring broad reach and flexibility. This combination of methodologies will provide a comprehensive understanding of current cybersecurity practices and perceptions within organizations.
References
- Ajzen, I. (1992). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179-211.
- Bach, M. P., Nauright, J., & Hishamuddin, H. (2017). Information security theory: Foundations and applications. Journal of Information Security, 8(3), 159-170.
- University of the Cumberland. (2023). Doctoral Research Handbook.
- Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W. W. Norton & Company.
- Andress, J. (2014). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress.
- Ravenek, J., & Cotton, R. (2018). Cybersecurity in the age of digital transformation. Harvard Business Review.
- Mitnick, K., & Simon, W. (2002). The Art of Deception: Controlling the Human Element of Security. Wiley.
- Warkentin, M., & Willison, R. (2009). Behavioral and policy issues in email security: An empirical investigation. MIS Quarterly, 33(2), 293-319.
- Schneier, B. (2020). Security and Privacy in the Internet of Things. IEEE Security & Privacy.
- Rogers, M. (2017). Strategic cybersecurity management: Leading organizations into the digital age. Cybersecurity Journal, 3(1), 45-58.