Written Assignment 2

  • Post category:Nursing
  • Reading time:3 mins read

Utilize the attached outline to answer the questions below

  1. List at least ten keywords you might use in an electronic search for literature. Refer to a thesaurus to see if they are valid for use in the database you plan to access.
  2. Name the logical operator(s) (AND, NOT, OR) described in this topic that you will use between your keywords, and explain why.

After you have read published research on your topic, if needed, redefine some of your definitions of each variable in light of how other researchers have defined them.

  1. List the headings and subheadings you anticipate using to organize your literature review. (Note that these may change after you have carefully examined all the literature on your topic.)
  2. Will you use sampling to obtain participants for your research? If yes, do you plan to use random sampling, systematic sampling, or some other method of sampling? Explain.
  3. Do you anticipate collecting demographics? If yes, list them and explain why you made that decision.

In light of the information in this topic and in the previous topic, what is your anticipated sample size? Explain the basis for your decision

Written Assignment 2

Name

Institution

Course

Instructor

Date

Written Assignment 2

  1. Keywords

Aviation, Aviation CSIRT, incident response management, critical infrastructure, cybersecurity hub, Cyber-security, cybercrime, hacking, phishing, Critical infrastructure, and Cybersecurity airworthiness.

  1. Logical operator

This study will mostly use AND as the only logical operator because it makes a lot of sense to use it while connecting the words. OR might not be necessary because we are not working with alternatives.

  1. Headings and subheadings
  2. Cybersecurity incidences over the last decade
  3. Causes of increased cybersecurity
  • Why aviation industry has to boost cybersecurity
  1. Common forms of cybercrimes
  2. Financial implications of cybercrimes in the aviation sector
  3. Proposed solutions to cybersecurity cases
  1. Sampling

I will not use any sampling method because the study will not require human participants to obtain data. The study will used secondary data from agencies and organizations such as NIST, FBI, CSIRT to study the statistical trends of cybercrimes over the last dacade.

  1. Demographics

Demographic data is not necessary for this study because related parameters, including gender, age, ethnicity, social statuses will not be applied as one of the variables to be assessed. Primary variables will be the number of recorded cybersecurity case across a given period and the associated financial implications.

  1. Sample size

Since the study will not have participants, sample size cannot be explicitly quantified. However, since I will be checking trends across the years, I will study the cybersecurity trends within the last decade (2011 to 2021).