Chat with us, powered by LiveChat This week you synthesize your review of scholarly literature and address the theoretical foundation or practice orientation for your study. Let’s discuss how - Tutorie

This week you synthesize your review of scholarly literature and address the theoretical foundation or practice orientation for your study. Let’s discuss how

Topic I am currently doing my study on!!

Cybersecurity ransomware attacks

 I JUST PUT A LINK FROM LAST WEEK DISCUSSION IT WAS NOT REQUIRED I USE IT BUT I POSTED IT JUST IN CASE SOMETHING IN IT WAS USEFUL!1

 INSTRUCTIONS!!

Relating Purpose to Proposed Study

This week you synthesize your review of scholarly literature and address the theoretical foundation or practice orientation for your study. Let's discuss how your proposed study benefits the field. For this week's discussion, choose one of the following for your post:

  • Discuss how your study is grounded in your field and the problem it addresses. Which new or different aspect of the problem does your proposed study address? How does this motivate you to continue your work?
  • Share how your study results may address the problem. Are you finding anything in your work that particularly surprises you? What will practitioners do better once they have the insights from your project?
  • As we wrap up this week, share resources from the course, the library, or your peers that were most relevant and immediately useful to your project.

I faced a few challenges while conducting my literature review of cybersecurity, especially ransomware attacks and organizational response strategies. It was time-consuming, especially trying to filter through the dozens of recent and relevant studies in the literature. Most identified sources were outdated or not precise enough to pinpoint the specific organizational actions when facing ransomware. Also, some articles obtained could only be accessed with a subscription service, making it difficult to obtain potentially important information (Zuniga, 202). Another difficulty was finding literature combining technical cybersecurity and organizational risk management perspectives. This overlap is significant for creating broader solutions; however, such approaches are often divided into technology or management categories, which makes identifying more complex interdisciplinary research more challenging. To address these issues, I adjusted my search terms. I limited the research to articles published in the past five years and included terms such as “ransomware response frameworks” and “organizational cybersecurity strategies.” By using databases such as PubMed, IEEE Xplore, or ProQuest, I gained access to high-quality, peer-reviewed articles. I also used institutional connections to circumvent many paywalls in various articles. There was concern involving identifying published studies that are easily understandable to non-specialists and evaluating how organizations train their employees to prevent ransomware attacks. To deal with the above, I will approach academic forums for assistance, consult with instructors, and talk to peers in the course to avoid losing sight of the fact that the literature base I have established for my project should be up-to-date and diverse. References Zuniga, H. (2022). Accessibility and E-resources: Why it matters and what you can do. The Serials Librarian, 82(1-4), 103-108.

Are you struggling with this assignment?

Our team of qualified writers will write an original paper for you. Good grades guaranteed! Complete paper delivered straight to your email.

Place Order Now