the application of mixed method in developing a cyber terrorism framework

PPTX 27 стр. 1,7 МБ Бесплатная загрузка

Предварительный просмотр (6 стр.)

Прокрутите вниз 👇
1 / 27
powerpoint presentation the application of mixed method in developing a cyber terrorism framework presented by:- ajay kumar koduri bhavana atluri manasa sutram shaayendra raju authors:- rabiah ahmad, zahri yunos cyber terrorism - introduction objective mixed-method research knowledge-management architecture grounded-theory framework research methodology framework data collection and analysis framework conclusion overview cyber terrorism cyber - anything that involved computer resources and information. terrorism - an act of violence. cyber terrorism history of attacks cyberterrorism is the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents. - by techtarget cyberterrorism is the convergence of cyberspace and terrorism. it refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. - by gabriel weiman …
2 / 27
logies. methodologies : qualitative research methodology and quantitative research methodology mixed-method research qualitative research methodology it is primarily interpretive research technique. it is used to gain an understanding of underlying reasons, opinions, and motivations. it provides insights into the problem or helps to develop ideas or hypotheses for potential quantitative research. advantages: it allows for the discovery of new ideas. used to build a theory around a particular phenomena or process. here the phenomena is “cyber-terrorism”. it is primarily a validating technique. it is used for testing or verification of conceptual framework that describes the phenomena via statistical, mathematical or computational techniques. advantages for achieving precise measurement of participants behaviour or knowledge. quantitative research methodology suitability of mixed method research mixed method approach helps to answer questions that cannot be answered by qualitative or quantitative approaches alone. qualitative research approaches seek to explore phenomena quantitative research approaches seek to confirm …
3 / 27
dentification of potential data sources associated with the research questions. the respondents are chosen from various expert positions to reflect variety of expertise. step 2 - data selection step 3 - data collection initiation of data collection from targeted respondents. it is an ongoing process, whereby the researcher can return to the interviewees for clarification and elaboration. also compares related documents or records with data collected in the initial stage of the research. step 4 - data analysis involves a constant comparison method for generating and analyzing data. it is a process of systematically searching and arranging the interview transcripts, field notes and other materials with the objectives to increase the understanding. step 5 - concluding the research involves documenting the grounded theory based on researcher observation of the data saturation and sufficient theory which has emerged from the data. data saturation: it is the evident when data collection no …
4 / 27
chniques are combined to discover the theory around a phenomenon and to verify it. relevance to our project - project proposal our project focuses on the methods to improve the efficiency of existing techniques to identify potentially harmful websites. to increase the performance of existing techniques we propose to use image analysis techniques like pixel comparison in addition to text analysis. relevance to our project to collect the text and image sources, we can use mixed-research method to construct a framework and verify it. once the websites are identified, it is easy to identify people connected with them and after further analysis we should be able to collect more quality data about the terrorist recruitments, financial aid that helps in understanding perception management. once we are able to discover the potential victims (i.e,) the people who are being influenced, we can use the grounded-theory method to develop a framework for …
5 / 27
the application of mixed method in developing a cyber terrorism framework - Page 5
6 / 27
the application of mixed method in developing a cyber terrorism framework - Page 6

Хотите читать дальше?

Скачайте все 27 страниц бесплатно через Telegram.

Скачать полный файл

О "the application of mixed method in developing a cyber terrorism framework"

powerpoint presentation the application of mixed method in developing a cyber terrorism framework presented by:- ajay kumar koduri bhavana atluri manasa sutram shaayendra raju authors:- rabiah ahmad, zahri yunos cyber terrorism - introduction objective mixed-method research knowledge-management architecture grounded-theory framework research methodology framework data collection and analysis framework conclusion overview cyber terrorism cyber - anything that involved computer resources and information. terrorism - an act of violence. cyber terrorism history of attacks cyberterrorism is the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine a...

Этот файл содержит 27 стр. в формате PPTX (1,7 МБ). Чтобы скачать "the application of mixed method in developing a cyber terrorism framework", нажмите кнопку Telegram слева.

Теги: the application of mixed method… PPTX 27 стр. Бесплатная загрузка Telegram