• +44 7897 053596
  • info@premierdissertations.com
Premier-Dissertations-LogoPremier-Dissertations-LogoPremier-Dissertations-LogoPremier-Dissertations-Logo
  • Home
  • Dissertation
        • Dissertation Service
        • Dissertation Topic and Outline
        • Dissertation Proposal Service
        • Dissertation Proofreading and Editing
        • Dissertation Chapter
        • Statistical Analysis Services
  • Services
        • Essay Writing Service
        • Assignment Service
        • Report Service
        • Coursework Service
        • Presentation Service
        • Model Answers and Exam Notes
        • Reflective Report Service
        • Poster Service
        • Literature Review Service
  • Dissertation Topics
        • Cognitive Psychology Dissertation Topics
        • Music Dissertation Topics
        • Physical Education Dissertation Topics
        • Forensic Science Dissertation Topics
        • Clinical Psychology Dissertation Topics
        • Islamic Finance Dissertation Topics
        • Social Psychology Dissertation Topics
        • Educational Psychology Dissertation Topics
        • Business Intelligence Dissertation Topics
        • Customer Service Dissertation Topics
        • Criminal Psychology Dissertation Topics
        • View All
  • Examples
    • Dissertation Examples
    • Report Examples
    • Dissertation Topic and Outline Examples
    • Essay Examples
    • Dissertation Proposal Examples
    • Assignment Examples
    • Dissertation Chapter Examples
    • Coursework Examples
    • Literature Review Examples
    • View All
  • Library
        • Student Blog
        • Dissertation Topics
        • Informative Articles
        • Academic Guidelines
        • Examples
        • Academic Library
  • Plagiarism Checker
        • Coursework Plagiarism Checke
        • Plagiarism Remover Service
        • Turnitin Plagiarism Checker Free Service
        • Difference Between Paraphrasing & Plagiarism
        • Free Plagiarism Checker for Students
        • How to Cite Sources to Avoid Plagiarism?
        • Assignment Plagiarism Checker
        • Dissertation Plagiarism Checker
        • Thesis Plagiarism Checker
        • Report Plagiarism Checke
        • Free Similarity Checker
        • How Plagiarism Checkers Work?
        • Plagiarism Checker Free Service
  • Free Topics
  • About Us
    • Contact us
    • FAQ
    • About Us
    • Reviews
  • Get a Free Quote
  • Home
  • Dissertation
    • Dissertation Service
    • Dissertation Chapter
    • Dissertation Topic and Outline
    • Dissertation Proposal Service
    • Statistical Analysis Services
    • Dissertation Proofreading and Editing
  • Services
    • Essay Writing Service
    • Assignment Service
    • Report Service
    • Coursework Service
    • Literature Review Service
    • Model Answers and Exam Notes
    • Reflective Report Service
    • Presentation Service
    • Poster Service
  • Dissertation Topics
    • Criminal Psychology Dissertation Topics
    • Cognitive Psychology Dissertation Topics
    • Social Psychology Dissertation Topics
    • Clinical Psychology Dissertation Topics
    • Educational Psychology Dissertation Topics
    • Customer Service Dissertation Topics
    • Music Dissertation Topics
    • Business Intelligence Dissertation Topics
    • Physical Education Dissertation Topics
    • Forensic Science Dissertation Topics
    • Islamic Finance Dissertation Topics
    • View All
  • Examples
    • Dissertation Examples
    • Dissertation Proposal Examples
    • Essay Examples
    • Report Examples
    • Coursework Examples
    • Assignment Examples
    • Literature Review Examples
    • Dissertation Topic and Outline Examples
    • Dissertation Chapter Examples
    • View All
  • Library
    • Academic Guidelines
    • Student Blog
    • Examples
    • Dissertation Topics
    • Informative Articles
    • Academic Library
  • Plagiarism Checker
    • Assignment Plagiarism Checker
    • Coursework Plagiarism Checke
    • Dissertation Plagiarism Checker
    • Thesis Plagiarism Checker
    • Report Plagiarism Checke
    • Plagiarism Remover Service
    • Plagiarism Checker Free Service
    • Turnitin Plagiarism Checker Free Service
    • Free Plagiarism Checker for Students
    • Difference Between Paraphrasing & Plagiarism
    • Free Similarity Checker
    • How Plagiarism Checkers Work?
    • How to Cite Sources to Avoid Plagiarism?
  • Free Topics
  • About Us
    • Contact us
    • FAQ
    • About Us
    • Reviews
  • Get a Free Quote
✕

Hire a Writer

Get an experienced writer
start working on your paper

Check Examples

Review Our Examples
before placing an order

Academic Library

Learn how to draft
academic papers

Overcoming Consequences of COVID-19 on Cyber security. The Emergence of Blockchain Apps

Home  »  Cryptocurrency • Dissertation Proposal Example • Examples • Master   »   Overcoming Consequences of COVID-19 on Cyber security. The Emergence of Blockchain Apps
How-to-Write-Dissertation-Aims-and-Objectives
How to Write Dissertation Aims and Objectives? | A Guide
August 31, 2022
Website Attributes on Consumer Buying Pattern: Case Study of Amazon and eBay
Website Attributes on Consumer Buying Pattern: Case Study of Amazon and eBay
September 6, 2022
September 6, 2022
Categories
  • Cryptocurrency
  • Dissertation Proposal Example
  • Examples
  • Master
Tags
Overcoming Consequences of COVID-19 on Cyber security. The Emergence of Blockchain Apps

Introduction

Background of the study 

According to the research of Agyepong et al. (2020); Khan, Brohi, and Zaman, (2020), cyber security has been one of the prominent elements for organizations to secure confidential information. Moreover, the research of Tashea (2018) highlighted that the emerging technology of blockchain has been protecting the organization from cyber threats as blockchain technology removes the centralized authority from controlling the network and flow of data giving a little window to hackers to infiltrate the cyber security of the organization. Similarly, the study of Singh and Singh (2016) specified that blockchain technology adds an extra layer of security for organizations to secure their devices and systems from potential cyber-attack. Additionally, the study of Bordoff, Chen, and Yan (2019); Okereafor and Adebola (2020) specifically emphasized the global pandemic of COVID-19 that encouraged remote working practice and allowed cyber frauds for invading the cyber security of multiple firms. Similarly, the study of Ahram et al. (2017) identified that blockchain technology has been difficult to temper as it distributes the key data on various nodes to keep the record making it difficult for a hacker to destroy the blockchain and impose a cyber threat on the organization.  

Problem Statement 

The research of Ahmad (2020); Khan, Brohi, and Zaman (2020); Wangila (2020) asserted that the crisis of COVID-19 has affected numerous organizations across the world. Similar research contemplated that COVID-19 has forced the organization to adopt remote working practices while making sure that critical business operations are regulated without any interference (Ahmad, 2020; Khan, Brohi, and Zaman, 2020; Wangila, 2020). However, the research of Wirth (2020); Okereafor, and Adebola (2020) asserted that the global pandemic of COVID-19 has raised a considerable number of challenges for organizations regarding cyber security. The study of Bordoff, Chen, and Yan (2019); Kour (2020); Agyepong et al. (2020) is of the view that major cyber security threats that have been faced by organizations are phishing, mal spam, and ransomware. The report of Okereafor and Adebola (2020) indicated that hackers used COVID-19 as an opportunity to mislead organizations and the general public into downloading particular applications or software to get updates on the global pandemic, however, upon downloading such applications, the hackers steal sensitive information and impose a threat of compromised cyber security on organizations. Thus, the current research studies the emerging technology of blockchain to overcome the cyber security threats experienced by organizations due to COVID-19. 

Testimonials

Very satisfied students

This is our reason for working. We want to make all students happy, every day.

Aim and Objectives

The study aims to identify the role of blockchain Apps that can overcome the consequences of COVID-19 on cyber security. 

To examine the theoretical concept of the consequences of COVID-19 on cyber security.

To assess the challenges and barriers associated with cyber security due to the global pandemic of COVID-19.

To identify the key elements pertinent to blockchain Apps that can cater to the consequences of COVID-19 on cyber security.

To provide recommendations for overcoming the consequences of COVID-19 on cyber security.

Literature Review

The research of Ahram et al. (2017) identified that blockchain technology has been one of the prominent technologies in various markets that are securing the organization from cyber-attacks. Furthermore, the study by Agyepong et al. (2020) highlighted that blockchain application has been used by organization to prevent data theft from committing fraud and putting the organization’s image at risk. Moreover, the study of Khan, Brohi, and Zaman (2020) indicated that blockchain technology is highly used by banking sectors, as the bank conducts several online financial transactions which require an extra layer of security. Additionally, the study by Kour (2020) asserted that the recent pandemic of COVID-19 offered extensive opportunities to hackers for compromising the cyber security of organizations via phishing and spam. However, the banking sector tends to introduce new trading platforms that follow blockchain protocol to reduce the maximum number of intermediaries and make transactions safe and secure (Bordoff, Chen, and Yan, 2019).

According to the research of Agyepong et al. (2020), blockchain technology has been playing a prominent role in combating the challenges that arose from the Coronavirus in handling the cybersecurity of banks. However, the report of Www2.deloitte.com. (2020) contemplated that COVID-19 increased the risk of security as several organizations have to adopt remote working practices. The same report added that misconfiguration of virtual private networks (VPN) and Denial of Service (DoS) attacks imposed extensive risk on organizations via exposure of sensitive information over the internet (Www2.deloitte.com. 2020). Moreover, the study by Bordoff, Chen, and Yan (2019) asserted that COVID-19 has delayed the detection and response to cyber-attacks being experienced by banks and corporations as the response time of an employee to report a cyber-attack is quite slower than IT department of any particular firm, which gave greater chance to hackers to steal the important data of firms.

3-Step Dissertation Process!

Get Topics

Get 3+ Dissertation Topics

Dissertation Proposal

Get a Proposal on your Topic

Full Dissertation

Get the Final Dissertation


Free Dissertation Topics Dissertation Proposal Examples Order Dissertation Proposal

A Brief Methodology 

Research Approach and Method 

According to the study by Flick (2015); Jonker and Pennink (2010), there are three main approaches for conducting the research known as abductive approach, inductive approach, and deductive approach. The current research would use a deductive approach to test the existing theory via building a hypothesis and conducting statistical analysis to accept or reject the hypothesis related to overcoming the consequences of COVID-19 on the cyber security of banks and the corporate sector of the UK via blockchain application.

The research of Anderson, Adey, and Bevan (2010); Mackey and Gass (2015); Kumar (2019) contemplated the three common methods for conducting the research named as mixed method, quantitative method, and qualitative method. The quantitative method uses statistical analysis to present facts and figures along with logical justification to present the findings (Mackey and Gass. 2015). The current research would employ a quantitative method, as the research aims to present objective findings based on overcoming the consequences of COVID-19 on the cyber security of banks and the corporate sector of the UK via blockchain application. 

Data Collection Method

According to the study by Anderson, Adey, and Bevan (2010), there are two ways to collect the data, the primary source, and the secondary source. The current research would use secondary data for literature to present critical arguments on blockchain technology and the consequences of COVID-19 on the cyber security of banks and the corporate sector in the UK. While the primary data would be collected through a survey questionnaire being filled by 100 IT managers of bank and corporate sectors of the UK

Data Analysis

The current research would use statistical analysis such as regression, frequency, and coefficient analysis using SPSS for data analysis collected through a survey questionnaire. 

Gantt chart

Task

Week 1

Week 2

Week 3

Week 4

Week 5

Week 6

Week 7

Week 8 

Week 9

Topic Research

         

Proposal

         

Chapter 1: Introduction

         

Chapter 2: Literature Review

        

Chapter 3: Research Methodology

         

Chapter 4: Data analysis

        

Chapter 5: Conclusion and Recommendation

         

How Does It Work?

Fill the Form

Please fill the free topic form and share your requirements

Writer Starts Working

The writer starts to find a topic for you (based on your requirements)

3+ Topics Emailed!

The writer shared custom topics with you within 24 hours


Fill the Form Now

References

Agyepong, E., Cherdantseva, Y., Reinecke, P. and Burnap, P., 2020. Cyber Security Operations Centre Concepts and Implementation. In Modern Theories and Practices for Cyber Ethics and Security Compliance (pp. 88-104). IGI Global.

Ahmad, T., 2020. Corona Virus (COVID-19) Pandemic and Work from Home: Challenges of Cybercrimes and Cybersecurity. Available at SSRN 3568830.

Ahram, T., Sargolzaei, A., Sargolzaei, S., Daniels, J. and Amaba, B., 2017, June. Blockchain technology innovations. In 2017 IEEE Technology & Engineering Management Conference (TEMSCON) (pp. 137-141). IEEE.

Anderson, J., Adey, P. and Bevan, P., 2010. Positioning place: polylogic approaches to research methodology. Qualitative Research, 10(5), pp.589-604.

Bordoff, S., Chen, Q. and Yan, Z., 2019. Cyber attacks, contributing factors, and tackling strategies: the current status of the science of cybersecurity. In Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications (pp. 20-37). IGI Global.

Www2.deloitte.com. 2020. [online] Available at: <https://www2.deloitte.com/content/dam/Deloitte/ng/Documents/risk/ng-COVID-19-Impact-on-Cybersecurity-24032020.pdf> [Accessed 4 June 2020].

Flick, U., 2015. Introducing research methodology: A beginner's guide to doing a research project. Sage.

Jonker, J. and Pennink, B., 2010. The essence of research methodology: A concise guide for master and PhD students in management science. Springer Science & Business Media.

Khan, N.A., Brohi, S.N. and Zaman, N., 2020. Ten Deadly Cyber Security Threats Amid COVID-19 Pandemic.

Kour, R., 2020. Cybersecurity Issues and Challenges in Industry 4.0. In Applications and Challenges of Maintenance and Safety Engineering in Industry 4.0 (pp. 84-101). IGI Global.

Kumar, R., 2019. Research methodology: A step-by-step guide for beginners. Sage Publications Limited.

Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design. Routledge.

Okereafor, K. and Adebola, O., 2020. Tackling The Cybersecurity Impacts Of The Coronavirus Outbreak As A Challenge To Internet Safety. Journal Homepage: Http://Ijmr. Net. In, 8(2).

Singh, S. and Singh, N., 2016, December. Blockchain: Future of financial and cyber security. In 2016 2nd international conference on contemporary computing and informatics (IC3I) (pp. 463-467). IEEE.

Tashea, J., 2018. What do AI, blockchain and GDPR mean for cybersecurity?. ABA Journal, 104, p.12.

Wangila, F., 2020. Organizational Cyber-Security Measures During COVID-19 Epidemic.

Wirth, A., 2020. Cyberinsights: COVID-19 and What It Means for Cybersecurity. Biomedical Instrumentation & Technology, 54(3), pp.216-219.

Get 3+ Free Dissertation Topics within 24 hours?


    Share
    21
    Iqra Khan
    Iqra Khan

    Related posts

    March 13, 2023

    PhD Proposal Examples


    Read more
    March 6, 2023

    Undergraduate Dissertation Proposal Example


    Read more
    March 6, 2023

    Masters Dissertation Proposal Example


    Read more

    Comments are closed.

    Dissertation Topics

    • Marketing Management Dissertation Topics
    • Company Law Dissertation Topics
    • Maritime Law Dissertation Topics
    • Intellectual Property Law Dissertation Topics
    • Commercial Law Dissertation Topics
    • Contract Law Dissertation Topics
    • Sports Psychology Dissertation Topics
    • Contract Law Dissertation Topics
    • Employment Law Dissertation Topics
    • Cognitive Psychology Dissertation Topics
    Verified Order

    Great Supportive Team

    I really like the way you guys work. You guys are doing an amazing job. I will let you know when I have my next essay writing order.

    Ellis
     
    Expert Writers

    Hire our expert academic writer for your dissertation paper!

       Dissertation Services


    Review Examples

    Check our Examples before placing an order!

       Dissertation Examples


    Free Topics

    Get 1 free topic in your area of study with aim and justification

       Yes I want the free topic

    About Us

    Supporting students since 2010, the team at Premierdissertations.com is arguably the UK’s most trusted and safe academic writing organization.

    +44 7897 053596

    160 Kemp House, City Road, London EC1V 2NX

    Our Services

    Full Dissertation Writing
    Dissertation Proofreading and Editing
    Dissertation Chapter Writing
    Dissertation Topic and Outline
    Dissertation Proposal
    Statistical Analysis Services
    Essay Writing Service
    Assignmet Writig Service

    Library

    Dissertation Topics
    Dissertation Examples
    Dissertation Proposal Examples
    Essay Examples
    Informative Articles
    Academic Guidlines
    Stundent Blog
    Examples

    Important Links

    About Us
    Contact Us
    Cookies Policy
    Fair Use Policy
    Privacy Policy
    Faqs
    Write a Review
    Terms and Conditions

    © 2023 Premier Essays. All Rights Reserved. Premier Essays
    • +44 7897 053596
    • info@premierdissertations.com