Documente Academic
Documente Profesional
Documente Cultură
INTRODUCTION
PURPOSE
STATEMENT OF PROBLEM
LITERATURE REVIEW
RESEARCH DESIGN, METHODOLOGY AND ANALYSIS
The
Various shortcomings:
Signature based frameworks
Inadequate scalability
Inadequate support for highly
distributed environments
Forensic vs. preemptive
Focused on compliance
Intrusion-centric
Difficult to deploy and manage
This
theory involves;
Understanding that the internet is a realist
security model which is ungoverned.
How to safeguard networks in an environment
where allies can not be fully trusted
Finding better methods of storing important
data through concentrating on mitigation of
data breaches and cyber-attacks
This
Questionnaire survey research design will be used; reason questionnaires are standardized and
can obtain large amounts of data from respondents. They are also cost-effective to administer and
get empirical first-hand data.
The target population for the study will be the IT experts in organizations in Kenya.
Purposive sample will be used and will compose of 100 IT expert respondents drawn from 25
organizations in Kenya. Reason purposive sampling targets specific information from expert
respondents who cannot be easy to get by random sampling.
Both primary and secondary data will be collected in the study. Primary data will be obtained from
questionnaire responses while secondary data will be obtained from sources such as
organizational publications, internet sources, reports etc.
5-point Likert scale rating will be used to transform responses to scalable quantities to ease
analysis.
Data will be both quantitative and qualitative. Reasons for use of quantitative methods are that
they are standardized, making them effective in comparing research findings with similar studies.
Additionally, they allow researchers to summarize vast sources of data. Qualitative methods
are reliable and valid because they employ prescribed procedures.
Quantitative data will be analysed using descriptive statistics in SPSS to obtain mean, standard
deviations, frequencies etc.
Qualitative data will be analyzed using inferential statistics as well as content analysis approaches
Ethical guidelines of research will be observed. Data will be used solely for research purposes and
necessary consents will be obtained from NACOSTI and other authorities
THANK YOU