Topic 15: Significance of Communication and Network Security
Research Aim: The core components of this area of information security include protecting communications, networks, and information systems that construct cyberspace. This research aims to identify how communication and network security reduce the occurrence of a cyber-attack. The study also aims to analyse different paradigms of communication and network security. The study employs a qualitative research methodology to complete the research.
Topic 16: Impact of Employee Training With Regards to Information Security on the Cyber Security of an Organisation
Research Aim: Information security aims to protect sensitive data, including financial data, intellectual property, and consumer account information, while also maintaining user privacy. This study identifies how information security awareness and employee training are beneficial for an organisation's cybersecurity. The study also analyses the critical factors of employee training through which employees are trained to secure sensitive data of an organisation. This study implements a secondary research method.
Topic 17: Critical cyber Security Initiatives after a Cyber Security Breach
Research Aim: Indeed, several important initiatives must be taken after a cyber-security breach or hacking. This study analyses the main preventive measures that an organisation or an individual must take after a cybersecurity breach. The study also identifies the approaches to mitigate a cyber-attack after its occurrence. The study employs a qualitative research approach to determine the preventive measures after a hacking or cyber security breach.
Topic 18: Importance of Cyber Security to Control Money Laundering
Research Aim: Money laundering can be done with anonymity and the ability to transfer unlawful funds swiftly between accounts. This proposed research is one of the dissertation topics on money laundering, which examines how cyber security is essential to minimise money laundering attempts. The study also identifies how cyber security can sustain transaction monitoring checks and customer due diligence and restricts money launderers from illegally transferring money between accounts. The study uses a mixed research approach to complete study.
Topic 19: Impact of the Legal Framework on Cyber Crimes
Research Aim: The increased utilisation of electronic and computing technologies has resulted in both legal and technical issues. Cybersecurity must include legal measures to deter cyber crimes. The main objective of this study is to analyse how legislation can restrict cyber crimes. The study also analyses how these legal clauses can restrict cyber crimes. This study employs a qualitative research method to analyse the research.
Topic 20: Data Governance Strategies for Digital Platforms
Research Aim: The amount of data being stored or transferred has significantly increased where personal or business data is being shared throughout networks and other platforms. The study aims to analyse the data governance strategies formulated by organisations for digital platforms to restrict data breaches. The research identifies how data governance strategies can mitigate cyber crimes. This study implements a mixed research method to complete the investigation.
Topic 21: Benefits of Penetration Testing Against Cyber Attacks: A Critical Review
Research Aim: The primary aim of this study is to analyse the benefits of penetration testing against cyber attacks.
Topic 22: Implementing Security Controls for Information Security Programs through Penetration Testing: Evidence from the Corporate Sector
Research Aim: This cyber security dissertation topic aims to assess the implementation of security controls for information security programs through penetration testing. The researcher aims to collect primary data from the corporate sector of the UK.
Topic 23: An Argument for Applying Forensic Accounting as part of Artificial Intelligence (AI): Reviewing Prospects of a Modern Structured Method and Its Implementation in Financial Management of Corporate Organisations
Research Aim: The application of Forensic Accounting as part of Artificial Intelligence (AI) and real-time data-based computer-aided systems has benefitted financial management practices worldwide. However, the application of Forensic Accounting as a Structured Method and Its Implementation in financial management has rarely been analysed. The study, therefore, aims to explore the implementation of Forensic Accounting on finance management principles and strategies using the ‘use case studies. The paper analyses the various factors related to Forensic Accounting technologies, allowing the industry to locate and address critical financial issues. The paper uses the design-science research paradigm in addition to questionnaires distributed to project managers in the corporate sector/industry. The data is analysed using the same methods in addition to text analysis.