CRP Poposal Final Fairoos

Download as pdf or txt
Download as pdf or txt
You are on page 1of 51

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)


INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC HND in Computing

Mr.Niruban Mr.G. Thanulagshan


Assessor Internal Verifier
Unit 13: Computing Research Project
Unit(s)
Final Research Project Proposal - Remote working
Assignment title
Fareed Mohammathu Fairoos
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date

Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)

1 FAREED MOHAMMATHU FAIROOS CRP


Higher Nationals - Summative Assignment Feedback Form
Student Name/ID Fareed Mohammathu Fairoos /00088038

Unit Title Unit 13: Computing Research Project

Assignment Number 1 Assessor


08/15/2022 Date Received
Submission Date
1st submission
Date Received 2nd
Re-submission Date
submission

Assessor Feedback:
LO1 Examine appropriate research methodologies and approaches as part of the research
process
Pass, Merit & Distinction P1 P2 M1 D1
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

2 FAREED MOHAMMATHU FAIROOS CRP


Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

For the course "Computing Research Project," Mr. V. Niruban is my lecturer. He does an
excellent job at lecturing. He employed a variety of innovative teaching techniques and helped
us to complete our assignments on time. In addition, he exhorted us to exert our utmost effort.

Assessor Date
signature
F.M FAIROOS 08/15/2022
Student signature Date

3 FAREED MOHAMMATHU FAIROOS CRP


Pearson
Higher Nationals in
Computing
Unit 13: Computing Research Project
Project Proposal

4 FAREED MOHAMMATHU FAIROOS CRP


General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course

5 FAREED MOHAMMATHU FAIROOS CRP


Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it means
to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Edexcel UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson , UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

Student’s Signature: Date:


E127765@esoft.academy 08/15/2022

6 FAREED MOHAMMATHU FAIROOS CRP


Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number Fareed Mohammathu Fairoos /00088038

Unit Number and Title Unit 13 – Computing Research Project

Academic Year 2021/22

Unit Tutor Mr.Niruban

Assignment Title

Issue Date 04/05/2022

Submission Date 08/15/2022

IV Name & Date

7 FAREED MOHAMMATHU FAIROOS CRP


Grading Rubric

Grading Criteria Achieved Feedback

P1 Produce a research proposal that clearly defines a


research question or hypothesis, supported by a literature
review

P2 Examine appropriate research methods and conduct


primary and secondary research.

M1 Evaluate different research approaches and


methodology and make justifications for the choice of
methods selected based on philosophical/ theoretical
frameworks.
D1 Critically evaluate research methodologies and processes
in application to a computing research project to justify
chosen research methods and analysis.

8 FAREED MOHAMMATHU FAIROOS CRP


Research Proposal Form
Student Name Fareed Mohammathu Fairoos
Student number 00088038 Date 08/15/2022

Centre Name ESOFT Metro Campus Batticaloa


Unit Unit 13: Computing Research Project

Tutor Mr. N. Niruban


Proposed title
Evaluate the impact of online security on improving remote working among team working

in banking industry during the pandemic.

Section One: Title, objective, responsibilities

Title or working title of research project (in the form of a question, objective or hypothesis): Research
project objectives (e.g. what is the question you want to answer? What do you want to learn how
to do? What do you want to find out?): Introduction, Objective, Sub Objective(s), Research
Questions and/or Hypothesis

Research Questions
What is the relationship between online security on remote working among Banking
industry.

• What is the relationship between Perceptions of the key challenge on online security
among the banking Industry?

• What is the relationship between Device Security production on online security among
the banking industry?

Research Objectives
To determine the relationship between online security on remote working among Banking
industry.

• To determine the relationship between Perceptions of the key challenge on online


security among the banking Industry.
• To determine the relationship between Device Security protection on online security
among the banking industry.

9 FAREED MOHAMMATHU FAIROOS CRP


Section Two: Reasons for choosing this research project
Reasons for choosing the project (e.g. links to other subjects you are studying, personal interest,
future plans, knowledge/skills you want to improve, why the topic is important): Motivation,
Research gap
This study is significant because it illustrates how security issues impede remote operations
in the banking industry. For Pandemic, fixing security issues of today is a big relief. The task
will be sufficient for more employees, and they will be visible to everyone while working;
remote work will be physically unable to do it. The sector's multiplier of force might be
technology, on the other side. Employees who work remotely have access to internet
resources that are not physically accessible to their management. There are other ways to
make remote work longer. Employees may utilize the Internet from anywhere at any time to
access workplace resources and initiatives. Executives can also participate in virtual expert
projects and meetings using technology to access resources. You may also obtain assistance
from your coworkers and share and gain knowledge and resources through your workplace
network.

Section Three: Literature sources searched


Use of key literature sources to support your objective, Sub Objective, research question and/or
hypothesis: Can include the Conceptual Framework
Due to the increased usage of remote working, businesses today confront new security
challenges, and conventional security solutions are failing to prevent accidental data loss and
the insider threat. Additionally, the usage of WFH has created threats from both inside and
outside the organization (from employees) (hackers and social engineers). the assertion
Following the COVID-19 pandemic, Hewlett-Packard, and the FBI claim that there have
been much more cyber and hacking efforts both internationally and domestically, increasing
by a combined 600% (Inglet, 2020) and 300%. (FBI IC3 Report, April 2020). Due to the
always looming threat posed by COVID-19, the number of people working from home has
increased in direct proportion to the assault rate. This section summarizes the results of many
Works from Home (WFH) surveys that were conducted both before and after the viral
pandemic by academics, cybersecurity experts, and information technologists. Crimes are
not created by computers. People who use computers to commit crimes. Employees of the
organizations may also be complicit, and they usually are (Viljoin, 2018) Deloitte provided
the following client notice prior to its own email platform attack in 2017: "A hacker obtained

10 FAREED MOHAMMATHU FAIROOS CRP


access to a firm's global email system via a stolen administrator account, giving them
privileged, unrestricted access to all areas. (Burke, 2018)

The first line of defense against cyberthreats and cybercrimes is knowledge and readiness.
Information security training is one such method. There are two types of training. The first
is geared for security experts and tries to expand knowledge of the most recent dangers as
well as skill levels in fending them off and minimizing their effects. The purpose of this
essay is to investigate the notion of a cyber range and to provide a thorough study of the
literature on unclassified cyber ranges and safety test beds (M. M. Yamin, 2020). In this
review, we create a taxonomy for cyber range systems and examine the literature that has
already been written, focusing on architecture and scenarios as well as capabilities, functions,
and resources, among other things. The dangers and potential solutions for the Remote
Working-based Smart Grid are examined in this article.

Protecting the operational assets and goals of the US Department of Health and Human
Resources and promoting optimal security practices in the protection of information systems
against unauthorized actors and cyber threats are made feasible by compliance with
established federal rules and standards (I. M. Venter, 2019). Automation reduces human
error in order processing, increasing the effectiveness of order delivery. Internet-based
attacks may put it at risk. By considering the defensive budget and the dependency on
features, we develop a novel attacker-defender model in this study to protect crucial assets
from a quantum response adversary. Every asset in the solution has a protection level that
indicates if it needs to be protected (Bell, 2019). This article provides an overview of the
datasets used, a comparison, and deep learning techniques for spotting cyber security
breaches. We present an overview of intrusion detection systems that use deep learning
particularly. First, the general deep learning technique is introduced together with its
theoretical applications to the network intrusion detection issue. We then examine several
machine learning methods for two objectives of network intrusion detection (J. Yan, 2018).
data from a virtual private network, an Android smartphone, traffic from remote workers,
and an internet connection (M. A. Ferrag L. M., 2020). The development of an intrusion
detection system (IDS) that can quickly and automatically identify and categorize
cyberattacks at network and host rates (IJRAR, 2019)

Section Four: Activities and timescales

11 FAREED MOHAMMATHU FAIROOS CRP


Activities to be carried out during the research project (e.g. research, development, analysis of ideas,
writing, data collection, numerical analysis, tutor meetings, production of final outcome, evaluation,
writing the report) and How long this will take:
Milestone Propose completion data
Study the topic 2022-04-22
Preparing research proposal 2022-05-23
Proposal Submission 2022-06-22
Gathering Primary and Secondary Data 2022-06-17
Preparing Task 1, Task 2, Task 3 for the Research 2022-07-01
Developing Questionnaire 2022-07-12
Data Collection from Questionnaire 2022-08-08
Data Analysis 2022-09-23
Finalizing Research 2022-11-25
Research Submission 2022-12-02

Section Five: Research approach and methodologies


Type of research approach and methodologies you are likely to use, and reasons for your choice:
What your areas of research will cover: Research Onion; Sample Strategy/Method; Sample Size
Research Onion Areas of will cover
Positivism Method
Deductive Method
Survey Method
Mono Method
Cross Section Method
Data collection and Data analysis

Reference List

15writers, 2012. [Online]


Available at: https://15writers.com/research-
onion/#:~:text=The%20research%20onion%20suggests%20mono,of%20qualitative%20and%20qu
antitative%20methodology.
[Accessed 05 08 2022].
Bevans., R., 2019. [Online]
Available at: https://www.scribbr.com/methodology/experimental-design/
[Accessed 06 08 2022].

12 FAREED MOHAMMATHU FAIROOS CRP


Burke, S., 2018. [Online]
Available at: https://www.crn.com/news/cloud/coronavirus-is-creating-a-global-work-at-home-
culture
[Accessed 26 07 2022].
Butakhieo, N., 2019. [Online]
Available at: https://www.tandfonline.com/doi/full/10.1080/25741292.2020.1863560
[Accessed 22 07 2022].
Caulfield, J., 2020. [Online]
Available at: https://www.scribbr.com/methodology/ethnography/
[Accessed 08 08 2022].
Chat, L., 2016. [Online]
Available at: https://kalyaneynath.wordpress.com/2016/06/02/time-horizon-cross-sectional-versus-
longitudinal-studies/
[Accessed 11 08 2022].
Dudovskiy, J., 2008. [Online]
Available at: https://research-methodology.net/research-methods/data-collection/
[Accessed 13 08 2022].
Dudovskiy, J., 2011. [Online]
Available at: https://research-methodology.net/research-philosophy/
[Accessed 02 08 2022].
Dudovskiy, J., 2011. [Online]
Available at: https://research-methodology.net/research-philosophy/positivism/
[Accessed 03 08 2022].
Dudovskiy, J., 2019. [Online]
Available at: https://research-methodology.net/research-methodology/research-approach/deductive-
approach-2/
[Accessed 04 08 2022].
formplus, 2021. [Online]
Available at: https://www.formpl.us/blog/survey-methods
[Accessed 06 08 2022].
Gardian, T., 2017. [Online]
Available at: https://www.theguardian.com/business/2017/sep/25/deloitte-hit-by-cyber-attack-
revealing-clients-emails
George, T., 2020. [Online]
Available at: https://www.scribbr.com/methodology/ethnography/
[Accessed 10 08 2022].

13 FAREED MOHAMMATHU FAIROOS CRP


IJRAR, 2019. [Online]
Available at: https://www.ijrar.org/papers/IJRAR1CBP189.pdf
[Accessed 28 07 2022].
Inglet, 2020. [Online]
Available at: https://www.ktvb.com/article/news/crime/its-just-ballooning-up technology-experts-
warn-against-increasing-cyber-security-threats-covid-19-pandemic/newswatch
Martha, 2007. [Online]
Available at:
https://www.scielo.br/j/rlae/a/v4vvLRXGjSqrLLfZSMPbyfs#:~:text=Multiple%20methods%2C%2
0or%20multi%2Dmethod,%2C%20qualitative%20methods%2C%20or%20both.
[Accessed 10 08 2022].
McCombes, S., 2019. [Online]
Available at: https://www.scribbr.com/methodology/case-study/
[Accessed 06 08 2022].
Peter C Whybrow, a. T. G., 2018. [Online]
Available at: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7927777/
[Accessed 20 07 2022].
Phair, D., 2020. [Online]
Available at: https://gradcoach.com/saunders-research-
onion/#:~:text=Saunders'%20(2007)%20Research%20Onion,any%20other%20formal%20research
%20project.
[Accessed 02 08 2022].
Presidency, I., 2021. [Online]
Available at: https://www.ilo.org/wcmsp5/groups/public/---dgreports/---
ddg_p/documents/publication/wcms_791858.pdf
[Accessed 17 11 2022].
Questionpro, 2009. [Online]
Available at: https://www.questionpro.com/blog/qualitative-research-methods/
[Accessed 14 08 2022].
Salah, M. A. K. a. K., 2018. [Online].
simplilearn, 2021. [Online]
Available at: https://www.simplilearn.com/what-is-data-collection-article
[Accessed 13 08 2022].
Viljoin, 2018. [Online]
Available at: https://www2.deloitte.com/au/en/pages/risk/articles/cybercrime-tech-problem.html

14 FAREED MOHAMMATHU FAIROOS CRP


voxco, 2018. [Online]
Available at: https://www.voxco.com/blog/what-is-research-methodology/
[Accessed 02 08 2022].
Ware, s., 2022. [Online]
Available at: https://lib-
guides.letu.edu/quantresearch#:~:text=Quantitative%20Research%20Definition
[Accessed 14 08 2022].
Wolf, E., 2021. [Online]
Available at: https://libanswers.snhu.edu/faq/264001
[Accessed 01 12 2022].

Comments and agreement from tutor


Comments (optional):

I confirm that the project is not work which has been or will be submitted for another qualification
and is appropriate.

Agreed Yes ☒ No Name Fareed Mohammathu Date 08/15/2022


☐ Fairoos

Comments and agreement from project proposal checker (if applicable)


Comments (optional):

I confirm that the project is appropriate.

Agreed Yes ☐ No Name Date



Research Ethics Approval Form
All students conducting research activity that involves human participants or the use of data
collected from human participants are required to gain ethical approval before commencing
their research. Please answer all relevant questions and note that your form may be returned
if incomplete.
Section 1: Basic Details
Project title: Evaluate the impact of online security on improving remote working
among team working in banking industry during the pandemic.
Student name: Fareed Mohammathu Fairoos
Student ID number: 00088038
Programme: HND in Computing
School: ESOFT Metro Campus in Batticaloa
Intended research start date: 04/05/2022
Intended research end date: 08/15/2022

15 FAREED MOHAMMATHU FAIROOS CRP


Section 2: Project Summary
Please select all research methods that you plan to use as part of your project
• Interviews: ☐
• Questionnaires: ☒
• Observations: ☐
• Use of Personal Records: ☐
• Data Analysis: ☐
• Action Research: ☐
• Focus Groups: ☐
• Other (please specify): ☐ ................................................................
Section 3: Participants
Please answer the following questions, giving full details where necessary.
Will your research involve human participants?

Who are the participants? Tick all that apply:


Age 12-16 ☐ Young People aged 17–18 ☐ Adults ☒
How will participants be recruited (identified and approached)?

Adults who work in banks as well as elderly people who actively use the banking sector will
participate. An approximate 30-person random sample group will be chosen from among
these participants to participate in the study.

Describe the processes you will use to inform participants about what you are doing:

As the researcher, I will create a Google Form Questionnaire and distribute it to everyone.
This could facilitate the collection of data for the study.

Studies involving questionnaires:

Will participants be given the option of omitting questions they do not wish to answer?

Yes ☐ No ☒
If “NO” please explain why below and ensure that you cover any ethical issues arising from this.

Studies involving observation:

Confirm whether participants will be asked for their informed consent to be observed.

Yes ☐ No ☒
Will you debrief participants at the end of their participation (i.e. give them a brief explanation of
the study)?

Yes ☒ No ☐
Will participants be given information about the findings of your study? (This could be a brief
summary of your findings in general)

Yes ☒ No ☐

Section 4: Data Storage and Security

16 FAREED MOHAMMATHU FAIROOS CRP


Confirm that all personal data will be stored and processed in compliance with the Data Protection
Act (1998)
Yes ☒ No ☐
Who will have access to the data and personal information?

During the research:

Where will the data be stored?


For security reasons, data will be saved on my computer, a pen drive, and Google Drive.
Will mobile devices such as USB storage and laptops be used?
Yes ☒ No ☐
If “YES”, please provide further details:
After the research:

Where will the data be stored?


No More data will be stored after the research

How long will the data and records be kept for and in what format?

Although data will be retained in pdf and doc formats, all forms of data will be erased after
the research is complete.
Will data be kept for use by other researchers?
Yes ☐ No ☒
If “YES”, please provide further details:

Section 5: Ethical Issues


Are there any particular features of your proposed work which may raise ethical concerns? If so,
please outline how you will deal with these:

Section 6: Declaration

I have read, understood and will abide by the institution’s Research and Ethics Policy:
Yes ☒ No ☐
I have discussed the ethical issues relating to my research with my Unit Tutor:
Yes ☒ No ☐
I confirm that to the best of my knowledge:
The above information is correct and that this is a full description of the ethics issues that may arise
in the course of my research.

Name: Fareed Mohammathu Fairoos

Date: 08/15/2022

Please submit your completed form to: ESOFT Learning Management System (ELMS)

17 FAREED MOHAMMATHU FAIROOS CRP


Higher National Diploma in Network Engineering

Research Proposal

Evaluate the impact of online security on


improving remote working among team
working in banking industry during the
pandemic.

Name: - Fareed Mohammathu Fairoos


Reg.No: - 00088038
Unit Tutor: - Mr. Niruban

18 FAREED MOHAMMATHU FAIROOS CRP


Acknowledgement
In this effort, I have made commitments. Without the considerate aid and support of several
persons and associations, it would not have been feasible. As a result of all of them, I should
extend my actual. My dedication to Esoft for their course is extremely strong. And constant
oversight, as well as for providing important information about the project and, in a similar
vein, for their support in seeing that the project was finished. I want to express my gratitude to
Mr. Niruban, a professor at the ESOFT Metro Campus, as well as other members of the Esoft
team for their supportive co-operation and encouragement in seeing this project through to its
successful conclusion.

Yours Truly
Mr. F.M Fairoos

19 FAREED MOHAMMATHU FAIROOS CRP


Table of Contents

Acknowledgement ................................................................................................................... 19

Table of Contents ..................................................................................................................... 20

List of Figures .......................................................................................................................... 22

List of Table ............................................................................................................................. 23

Chapter - 01 .............................................................................................................................. 24

1.0 Introduction ................................................................................................................... 24

1.1 Background Study .......................................................................................................... 25

1.2 Problem Statement ......................................................................................................... 26

1.3 Research questions ......................................................................................................... 29

1.4 Research Objective ........................................................................................................ 29

1.5 Significance of Study ..................................................................................................... 29

1.6 Chapter Profile ............................................................................................................... 30

1.7 Delimitation ................................................................................................................... 31

Chapter – 02 ............................................................................................................................. 31

2.0 Literature Review ............................................................................................................... 31

2.1 Online security on improving remote working .............................................................. 31

2.1.1 Perceptions of the key challenge ............................................................................. 32

2.1.2 Device Security protection ...................................................................................... 33

2.2 Research Gap ................................................................................................................. 34

2.2.1 Knowledge Gap....................................................................................................... 34

Chapter - 03 .............................................................................................................................. 35

3.0 Research Methodology ...................................................................................................... 35

3.1 Research onion ............................................................................................................... 35

3.1.1 Research Philosophies............................................................................................. 36

3.1.2 Research Approaches .............................................................................................. 37

20 FAREED MOHAMMATHU FAIROOS CRP


3.1.3 Research Strategies ................................................................................................. 38

3.1.4 Research Choices .................................................................................................... 39

3.1.5 Research Time Horizon .......................................................................................... 41

3.2 Data Collection and Analysis ......................................................................................... 42

3.2.1 Data Collection ....................................................................................................... 42

3.2.2 Data Analysis .......................................................................................................... 44

3.3 Population and Sampling ............................................................................................... 45

3.4 Role of Researcher ......................................................................................................... 45

3.5 Generalizability .............................................................................................................. 45

3.6 Reliability and Validity .................................................................................................. 46

3.7 Conceptual Framework .................................................................................................. 46

3.8 Hypothesis Statement ..................................................................................................... 46

3.9 Ethical Consideration ..................................................................................................... 47

3.10 Timeline ....................................................................................................................... 47

CONCLUSION ........................................................................................................................ 48

REFERENCES......................................................................................................................... 49

21 FAREED MOHAMMATHU FAIROOS CRP


List of Figures
Figure 1Cyber Attack ............................................................................................................... 27
Figure 2vulnerable Statement in Covid-19 .............................................................................. 28
Figure 3 Research Onion.......................................................................................................... 35
Figure 4 Conceptual Framework.............................................................................................. 46
Figure 5Timeline ...................................................................................................................... 47

22 FAREED MOHAMMATHU FAIROOS CRP


List of Table
Table 1 Chapter Profile ............................................................................................................ 30
Table 2 Population and Sampling ............................................................................................ 45

23 FAREED MOHAMMATHU FAIROOS CRP


Chapter - 01

1.0 Introduction
National initiatives to improve the pandemic situation during the COVID-19 pandemic, which
mandated remote work for all whose jobs allow it, have also helped to support a considerable
rise in the number of firms who provide employees the option to work remotely. This chapter
provides a background on and introduction to the subject. In addition to highlighting the
study's issue, it aims to clarify the study's rationale and motive. information about the context,
the research questions, the delineation, and the goals, all of this is mentioned, as well as the
study's importance. Finally, it highlights the study's chapter profile. Secure remote computing
capabilities and connections to data centers and cloud applications allow Secure Access
solutions to keep IT-based enterprises operating even when things go wrong. However,
because it adds fresh and unidentified cyber dangers, this method calls for extra vigilance.
This research covers information security and cybersecurity, the impact of remote working
on cybersecurity, the Internet of Things and security device concepts, as well as the
fundamentals of remote working and its advantages and disadvantages. It also covers
behaviors to discuss in challenging situations. Businesses made quick progress in enhancing
and strengthening their safe remote work from home policies. The shift to remote work and
the pressing need for remote work capabilities influences IT infrastructure, organizational
continuity, and information security in addition to potentially harming user productivity. In
addition to looking at cybersecurity concerns, difficulties, and measures, this study also looks
at how corporations shifted personnel and other resources.

Not only is the protection of business information crucial while working remotely, but also
the protection of personal data. Considering the COVID-19 outbreak, the paper examines the
cybersecurity vulnerabilities brought on by shifting employee behaviors and remote work.
research challenge. The COVID-19 pandemic is having a negative impact on the banking
industry's cybersecurity in terms of employee habits and digital skills, awareness of cyber
hygiene, and the quick adoption of remote working solutions, compelling employers to
modify organizational cyber-risk management procedures to suit employee habits. The
hazards to organizations' and firms' cyber security have escalated because of remote working
during the COVID-19 epidemic. (Presidency, 2021)

24 FAREED MOHAMMATHU FAIROOS CRP


1.1 Background Study
Even in ordinary situations, internet crimes like scams offer larger profits with the least danger
to the assailants. Analyzing the fact that more individuals are unemployed today, they spend
more time at home and utilize the Internet for work, to interact with others. Governments have
also offered financial assistance to individuals and other businesses through the form of
incentives. to try and keep or win over customers. All throughout the world, people are looking
for a possible COVID-19 treatment as they wait for the public's interest will be piqued by
information on "COVID-19." This is a route that the con artists are using. to send people
harmful assaults with links to other websites while posing as representatives of the government,
tax authorities, etc. In relation to COVID-19, request assistance. The World Economic Forum
(WEF) emphasized in its report that hacking and phishing had become the new standard. even
when the viruses are no longer present. Now that the epidemic is here, these scams are even
more successful because the most susceptible people are increasingly worried and anticipating
communications from the authorities on COVID-19 via emails, texts, calls, etc. as online
criminals increase. They may produce false messages or websites that imitate the appearance
much more easily now that they are more aware of the problem. of reliable authorities, using
terms that convey urgency to capitalize on the widespread feeling of fear caused by the
significance of managing demands and emergencies. Consequently, cybercriminals might
boost the efficiency of their Phishing scams.
These attacks can take many different forms, including internal and external updates, personal
profits, and charitable contributions. Spam is one of the typical means of spreading malware,
according to a recent Secure study. It also highlighted the way that hackers are utilizing the
epidemic to lure users to click, mostly by concealing the executable in archive files like.zip
files. It should be noted that malicious actors occasionally employ legitimate, already-existing
content as a sort of provocation to persuade victims to take a risky action, like clicking a link
or opening an attachment. Before taking any action, users must verify the sender of an email
and review any links it may include. To fool users into clicking links or opening infected
documents, cybercriminals frequently use impersonation techniques by pretending to be the
World Health Organization (WHO), United Nations (UN), or a well-known company while
they are WFH, Zoom.
Due to the pandemic, practically the entire planet has been placed in complete lockdown. The
industry is somewhat concerned about the change to the new style of working, where workers
work mostly from home using home systems that are guarded by their employers. Due to this

25 FAREED MOHAMMATHU FAIROOS CRP


mass quarantine plan, there are new issues that are crucial for the resilience of technological
solutions to most ecosystems, notably the resilience of the most recent technology within
employers' existing cyber infrastructures. (Peter C Whybrow, 2018)

1.2 Problem Statement


Working from home is now much more commonplace globally since the pandemic. Numerous
believe that remote working will continue to be common across many industries even after the
pandemic has passed. While it is practical and offers numerous advantages, working from home
also exposes people and businesses to a variety of cybersecurity Risks. Because of this, remote
working cybersecurity must be seriously considered. It may simply reduce most cybersecurity
hazards by adhering to basic practices.
Most financial sector firms have already been using remote access facilities, however, installed
capacities may not have been enough to support most of the workforce simultaneously, which
increases potential security risks. IT departments are under pressure to upgrade capacities fast
and this results in changing or replacing existing systems with little time to do thorough security
tests. Vulnerabilities in the remote access infrastructure and access protocols may remain
undetected and can be exploited in cyberattacks. Cloud technologies are increasingly
implemented and used to quickly deal with higher capacity needs. Under time and resource
pressures, inherent security risks coming with the usage of cloud services might not have been
properly assessed and existing controls might not be fully effective in the new environments.
This risk is also present using cloud service providers that are generally regarded as providing
secure infrastructure, because user organizations themselves are always responsible for certain
aspects of cloud security (such as setting up proper access controls). Employees unfamiliar
with working remotely and under stress caused by the pandemic, can become easy targets of
phishing and social engineering attacks. (Butakhieo, 2019)

Over the past few weeks there has been an increase in cyberattacks designed to trigger a
response by exploiting our natural sensitivity to COVID-19 related information. Examples
include clicking malicious links and downloading malware infected attachments or
applications. Insecure endpoints and weak remote access authentication are two main elements
that increase the risk of such attacks succeeding. Examples of insecure endpoints are notebooks
or other mobile devices without the latest security patches installed. Password based
authentication without a second factor is considered weak in the context of remote access.

26 FAREED MOHAMMATHU FAIROOS CRP


However, enforcing strong password requirements remain an important issue to be addressed.
Functions dealing with critical systems and data that are normally not allowed to be conducted
off premises, for example treasury operations, might need to be carried out remotely during the
pandemic. Existing controls might not be enough to protect critical functions, system and data.
Technical and policy measures that focus on information security are key in mitigating the
cybersecurity risks of remote access. While not specific to remote access, strict information
security policies (including data access control and extensive logging and monitoring policies)
underpin remote access security. Some firms have had weaknesses in the implementation of
such policies and are therefore more likely to be successfully attacked during the pandemic.

Figure 1Cyber Attack


constantly evolving to take advantage of online behavior and trends. The COVID-19 outbreak
is no exception. From the very beginning of the COVID-19 crisis, criminals have used the
coronavirus to carry out social engineering attacks themed around the pandemic to distribute
various malware packages. cybercriminals were using fake versions of decease spread maps to
obtain access to personal data stored in user’s web browsers (credentials, credit card data, etc.)
Cyber-attacks during the pandemic can be categorized into the categories: scams and phishing,
malware, Hacking and Dos Cyber criminals and Advanced Persistent Threat groups are
launching cyber-attacks at vulnerable people and organizations via COVID-19 related scams
and phishing. They are exploiting the pandemic for various motivations, for instance for
commercial gain or to collect information related to COVID-19 vaccines by deploying different
techniques such as phishing or ransomware and other malware. Examples of APT activities
during the pandemic include Hades, Patchwork Therefore, sending millions of emails to

27 FAREED MOHAMMATHU FAIROOS CRP


victims who are seeking to apply for funding relief provided by the government, their
employers, banks, etc., will result in swift and enormous rewards.

There are various phishing attacks (email, SMS, voice) targeting vulnerable people and systems
using coronavirus or COVID-19 as a title to entice people.

Figure 2vulnerable Statement in Covid-19


While reputable financial institutions implement a slew of security measures, you can take
some steps on your own to keep your financial and personal details out of the hands of hackers.
Despite the proposed procedures described in this work, information security techniques must
still be employed to guarantee the highest level of protection from cyber criminals. Installing
and configuring network-based intrusion detection systems, and updating network tools
(NIDS), To combat cybercrime in the COVID-19 Pandemic age, other measures like as
effective mechanisms to recognize phishing attempts, email limits on attachments, reporting
tools, proper implementation of firewalls, and penetration testing are still needed. To help
teleworkers recognize potential hazards and avoid giving sensitive information to unauthorized
people using social engineering techniques. (Butakhieo, 2019)

28 FAREED MOHAMMATHU FAIROOS CRP


1.3 Research questions
What is the relationship between online security on remote working among Banking industry.

• What is the relationship between Perceptions of the key challenge on online security among
the banking Industry?

• What is the relationship between Device Security production on online security among the
banking industry?

1.4 Research Objective


To determine the relationship between online security on remote working among Banking
industry.

• To determine the relationship between Perceptions of the key challenge on online security
among the banking Industry.
• To determine the relationship between Device Security protection on online security
among the banking industry.

1.5 Significance of Study


Important of Research on Employee motivation and engagement have defined the elements
that raise employee engagement levels. Such studies have not looked at the factors that affect
employees' involvement with remote work. The current study was created with the goal of
identifying the situations and reactions that are crucial for preserving, enhancing, or degrading
workplace engagement in remote work. Organizational leaders who are contemplating remote
working choices may use the knowledge and data from this study to help them make better
educated, data-driven decisions. Employees seek out technology advancements as they become
available to enhance and expand their possibilities for remote work. This study is helpful for
individuals who are strategically contemplating giving remote work but want to make sure they
can retain high levels of engagement at work.

29 FAREED MOHAMMATHU FAIROOS CRP


1.6 Chapter Profile

Table 1 Chapter Profile

Chapter Name Chapter Description


Chapter 01 The study is explained in this chapter. This chapter's objectives
are to highlight the study's problem, as well as to provide the
background and rationale for the research. It covers the study's
history, research topics, boundaries, and goals as well as its
significance. The chapter profile of the research is stated in the
conclusion.

Chapter 02 The relevance of the next chapter is to locate the literature


review, which is a scholarly work that contains up-to-date
information, important discoveries, as well as theoretical and
methodological contributions to a certain subject. The
discussion continues with the researchers discussing the
knowledge gap in their field.

Chapter 03 The following chapter goes over the value of research


methodologies. It includes details about the research process,
including the population and sampling, data collection, the
researcher's responsibilities, generalizability, validity, and
reliability, data analysis, the conceptual framework, and the
hypothesis. It then discusses moral concerns.

30 FAREED MOHAMMATHU FAIROOS CRP


1.7 Delimitation
This study was carried out by the researcher using the most recent theories on the culture of
remote work. How to Manage in a Covid 19 Situation with More Safety and Cyber Security.
While having a remote office may be wise and advantageous, it is possible that doing so
accidentally raises the risk of data breaches and other cyber incidents, which may then result
in data breaches and or other cyber incidents. Protecting Bank's sensitive data is the most urgent
concern, even if the move to a fully remote office has several advantages, such as securing
connections and preserving productivity and improving Digital Business Performance. A
totally remote office presents cybersecurity vulnerabilities that can be taken advantage of by
irate workers taking private information or opportunistic hackers breaking into your company's
network. The major goal of this initiative is to prevent this.

Chapter – 02

2.0 Literature Review

2.1 Online security on improving remote working


Due to the increased usage of remote working, businesses today confront new security
challenges, and conventional security solutions are failing to prevent accidental data loss and
the insider threat. Additionally, the usage of WFH has created threats from both inside and
outside the organization (from employees) (hackers and social engineers). the assertion
Following the COVID-19 pandemic, Hewlett-Packard, and the FBI claim that there have been
much more cyber and hacking efforts both internationally and domestically, increasing by a
combined 600% (Inglet, 2020) and 300%. (FBI IC3 Report, April 2020). Due to the always
looming threat posed by COVID-19, the number of people working from home has increased
in direct proportion to the assault rate. This section summarizes the results of many Works
from Home (WFH) surveys that were conducted both before and after the viral pandemic by
academics, cybersecurity experts, and information technologists. Crimes are not created by
computers. People who use computers to commit crimes. Employees of the organizations may
also be complicit, and they usually are (Viljoin, 2018) Deloitte provided the following client
notice prior to its own email platform attack in 2017: "A hacker obtained access to a firm's
global email system via a stolen administrator account, giving them privileged, unrestricted
access to all areas. The account, which was housed on a Microsoft Azure cloud service

31 FAREED MOHAMMATHU FAIROOS CRP


platform, only had a single password, and did not require two-step verification, according to
(Guardian, 2017). This case study showed that any company, including those that aggressively
promoted WFH procedures and regular employee travel overseas and who claimed to be
cybersecurity authority, is vulnerable to social engineering hackers. In the end, Deloitte
adopted its own cybersecurity advice, and a year later, the ALM Best Cybersecurity Consulting
Report named it a global leader in cybersecurity. (Burke, 2018)

2.1.1 Perceptions of the key challenge

The first line of defense against cyberthreats and cybercrimes is knowledge and readiness.
Information security training is one such method. There are two types of training. The first is
geared for security experts and tries to expand knowledge of the most recent dangers as well
as skill levels in fending them off and minimizing their effects. The purpose of this essay is to
investigate the notion of a cyber range and to provide a thorough study of the literature on
unclassified cyber ranges and safety test beds (M. M. Yamin, 2020). In this review, we create
a taxonomy for cyber range systems and examine the literature that has already been written,
focusing on architecture and scenarios as well as capabilities, functions, and resources, among
other things. The dangers and potential solutions for the Remote Working-based Smart Grid
are examined in this article. The paper focuses on different types of cyberthreats and goes in-
depth on the cyber-security environment of the Smart Grid. We specialize on identifying and
assessing network vulnerabilities, posing problems for defenses, and calling for protection. We
work to give a thorough understanding of cyber-security flaws and remedies as well as a road
map for future cyber-security study in smart grid applications (Salah, 2018). Based on the idea
of adaptive focused testing, a model for the control V&V process for cyber security is created
in this study to address the issue. To identify and rank fault-prone information security controls,
a quantitative technique is also developed. The model created may offer a different and more
trustworthy foundation for expert subjective assessment, according to verification (C. Lee,
2018). This article focuses on the significance of various cyber defense standards and the
design of the framework for cyber security. We talk about cyber security measures, security
assaults, and dangers. Then we talk about the various aspects of standardizing cyber security.
We also talk about numerous government initiatives to safeguard cyber security as well as the
national information security strategy. Finally, we offer a few crucial recommendations for
information security and safety (J. Srinivas, 2019). In this essay, the standards for the Federal
Government's assessment of cybersecurity practices for the US Department of Health and
Human Services are covered. (IJRAR, 2019)

32 FAREED MOHAMMATHU FAIROOS CRP


2.1.2 Device Security protection

Protecting the operational assets and goals of the US Department of Health and Human
Resources and promoting optimal security practices in the protection of information systems
against unauthorized actors and cyber threats are made feasible by compliance with established
federal rules and standards (I. M. Venter, 2019). Automation reduces human error in order
processing, increasing the effectiveness of order delivery. Internet-based attacks may put it at
risk. By considering the defensive budget and the dependency on features, we develop a novel
attacker-defender model in this study to protect crucial assets from a quantum response (QR)
adversary. Every asset in the solution has a protection level that indicates if it needs to be
protected (Bell, 2019). This article provides an overview of the datasets used, a comparison,
and deep learning techniques for spotting cyber security breaches. We present an overview of
intrusion detection systems that use deep learning particularly. Since the dataset is essential for
intrusion detection, we categorize 35 well-known cyber datasets into seven groups: network
traffic dataset, electric network dataset, internet traffic dataset, virtual private network dataset,
android device dataset, remote working traffic dataset, and internet link (M. A. Ferrag, 2019).
Intrusion detection systems (IDS) are typically developed using machine learning techniques
to recognize and classify cyberattacks at network and host rates swiftly and automatically.
When dangerous assaults are frequent, constantly changing, and call for a scalable response, a
variety of problems come into play. Information security experts have access to many malware
databases for additional study (R. Vijayakumar, 2019). The goal of this project is to create
automatic and effective deep learning techniques to extract valuable feature representations
from enormous quantities of unlabeled raw network traffic data. We propose a unique intrusion
model for the network and test our approach on two brand-new intrusion detection datasets.
Our strategy is based on stacking dilated convolutional auto encoders. Several studies have
been carried out to see if our plan is effective (Y. Yu, 2017). By creating the detection engine
utilizing a variety of complex deep learning models, comparing, and statistically analyzing
these models, we evaluate the practicality of off-line deep learning based NID Sets in this work.
First, the general deep learning technique is introduced together with its theoretical applications
to the network intrusion detection issue. We then examine several machine learning methods
for two objectives of network intrusion detection (J. Yan, 2018). data from a virtual private
network, an Android smartphone, traffic from remote workers, and an internet connection (M.
A. Ferrag L. M., 2020). The development of an intrusion detection system (IDS) that can
quickly and automatically identify and categorize cyberattacks at network and host rates

33 FAREED MOHAMMATHU FAIROOS CRP


frequently makes use of machine learning methods. However, several issues arise when
harmful assaults are constantly changing and happen in a huge number, necessitating a scalable
solution. There are various publicly available databases of malware that the information
security community may research further (R. Vinayakumar M. A., 2019). This study's ultimate
objective is to automatically and effectively employ deep learning techniques to build usable
feature representations from massive amounts of unlabeled raw network traffic data. By
stacking dilated convolutional auto encoders, we suggest a unique intrusion model for the
network and test our method on two fresh intrusion detection datasets. Numerous studies have
been conducted to determine the effectiveness of our strategy (Y. Yu, 2017). This study
explores the viability of off-line deep learning based NIDSes by developing the detection
engine with various very advanced deep learning models and undertaking a quantitative and
comparative evaluation of these models. First, we discuss deep learning's general methodology
and its theoretical implications for the problem of network intrusion detection. Next, we
examine several machine learning techniques for two network intrusion detection tasks (J. Yan,
2018) (IJRAR, 2019)

2.2 Research Gap


An unresolved issue or topic in a field of study or research is referred to as a research gap. A
research gap might occasionally emerge when a topic or novel idea hasn't been thoroughly
investigated. Large amounts of data are therefore unavailable while research is being done on
the subject. A research break is necessary right now. New and interesting study directions may
be generated when research gaps are identified. (Wolf, 2021)

2.2.1 Knowledge Gap


According to existing official data, there has not been much work done in Sri Lanka in regard
to online security in remote working. As a result, a study into the impact of online security on
improving remote working among team working in banking industry during the pandemic is
necessary. As a result, this research will fill that gap

34 FAREED MOHAMMATHU FAIROOS CRP


Chapter - 03

3.0 Research Methodology


A research methodology is a description of how a certain piece of research is conducted. It
identifies and describes the methods or processes used to locate and examine data pertaining
to a certain area of study. Therefore, the research technique is concerned with how a researcher
plans their study in a way that enables them to get accurate and trustworthy results and achieve
their research goals. (voxco, 2018)

3.1 Research onion


When establishing a research technique, whether for your dissertation, thesis, or any other
formal research endeavour, there are several choices you'll need to make. The concept of the
"research onion" explains these choices. As you work your way inward from the exterior of the
onion, you'll be presented with a variety of decisions, ranging from high-level and
philosophical to tactical and practical in nature. This echoes the broad format of the methods
chapter as well. (Phair, 2020)

Figure 3 Research Onion

35 FAREED MOHAMMATHU FAIROOS CRP


3.1.1 Research Philosophies

Since research philosophy is a broad subject, we won't go into great depth here. Assumption,
knowledge, and the nature of the investigation are all factors in research philosophy. It talks
about a certain method of learning. Philosophy enables us to comprehend the assumptions
made by researchers, who may have diverse conceptions of the nature of knowledge and truth.
This issue must be addressed. (Dudovskiy, 2011)

3.1.1.1 Positivism
Positivism is a philosophy that upholds the idea that only knowledge that is "factual" and
obtained through the senses, including measurement, is reliable. Researcher responsibilities in
positivist studies are restricted to gathering data and objectively interpreting it. In other words,
while conducting the study, the researcher maintains her objectivity and dissociates herself
from her own values. Results of these studies' research are frequently observable and
quantifiable. (Dudovskiy, 2011)

3.1.1.2 Realism
The basis of the realism research philosophy is the notion that reality is independent of the
intellect. This ideology is predicated on the notion that knowledge development is best handled
scientifically. (Dudovskiy, 2019)

3.1.1.3 Interpretivism
Interpretivism, sometimes referred to as interpretivism, includes researchers in the
interpretation of study components; as a result, interpretivism incorporates human interest into
a study. Accordingly, interpretive scholars argue that access to reality (given or socially
produced) is solely through social creations like language, awareness, shared meanings, and
tools. (Dudovskiy, 2019)

3.1.1.4 Pragmatism
The extreme ideologies of positivism and interpretivism concerning the nature and sources of
knowledge are mutually irreconcilable. These two primary paradigms generally encompass
many dissertation subjects. At the same time, there is occasionally a need for seasoned
researchers to change their philosophical assumptions over time and migrate to a new place on
the continuum. Pragmatic researchers, who are often seasoned researchers, apply the updated
philosophical premises.

36 FAREED MOHAMMATHU FAIROOS CRP


Reason for choosing Positivism to do the research
This investigation will be supported by facts and theories from science that the public may take
to be true. The existing knowledge theory will be used to generate all the hypothesis
investigation questions. This philosophical method can be used by other academics to conduct
studies that are comparable to statistical analysis. Positivism allows a researcher to reach a
conclusion utilizing statistical techniques including correlation, regression, probability, and
hypothesis testing. For the reasons outlined above, the researcher opts for a positivism research
strategy. Positive thinking bases all its knowledge only on facts that can be seen, giving little
weight to non-observable elements like attitudes and values.

3.1.2 Research Approaches

The research onion recommends that once the learner has selected the proper approach, the
proper research should be chosen. The deductive technique begins with the formation of a
specific hypothesis based on the researcher's observation of the literature review, and then it
gradually attempts to test this hypothesis and determine whether it is true in certain settings.
The inductive method, in contrast, begins with observations that the researcher then utilizes to
develop a new hypothesis. (15writers, 2012)

3.1.2.1 Inductive
The inductive method, sometimes referred to as inductive reasoning, begins with observations,
and theories are then put forth at the conclusion of the research process because of the
observations. Finding patterns in observations and developing explanations and theories for
those patterns through a set of hypotheses are both components of inductive inquiry. When
conducting an inductive investigation, no theories or assumptions would be relevant at the
outset, and the researcher is free to change the study's path after it has started. (Dudovskiy,
2019)

3.1.2.2 Deductive
In a deductive approach, a hypothesis (or several hypotheses) is developed based on an existing
theory, and a research plan is then created to test the hypothesis. Deductive reasoning,
according to a common definition, involves moving from the specific to the broad. It may be
true in many instances if a theory or case example seems to imply a causal relationship or link.
To determine whether this relationship or link did exist under more general conditions, a
deductive design could be used. (Dudovskiy, 2019)

37 FAREED MOHAMMATHU FAIROOS CRP


Reason for choosing Deductive to do the research
The deductive method comprises making a hypothesis that is based on an established theory
and then testing it by creating a research plan. Despite the dearth of available material, several
attempts to identify the approaches have been made, and this study uses a deductive
methodology. Because there may or may not be a substantial association between the various
study variables, the researcher used a deductive technique to make this determination. As well
as beginning with observation, it aids with pattern recognition.

3.1.3 Research Strategies

The researcher is then asked to design the study's approach. According to the research onion,
tactics might be case study research, action research, experimental research, interviews,
surveys, and systematic literature reviews. The method is selected depending on the
information needed for the study and its goal.

3.1.3.1 Survey
A survey method is a procedure, instrument, or technique you might use to interview a
predetermined group of individuals to collect data for your project. Typically, it makes it easier
for participants in the research to communicate with the individual or group conducting the
study. Depending on the sort of study you're conducting and the kind of data you ultimately
want to collect, survey methodologies might be either qualitative or quantitative. For instance,
you may use Form plus to design and manage an online survey that lets you gather statistical
data from respondents. You can set up a focus group or perform an in-person interview for
qualitative research. (formplus, 2021)

3.1.3.2 Case Study


An in-depth examination of a particular subject, such as a person, group, location, occasion,
business, or phenomenon, is known as a case study. Case studies are frequently employed in
business, social, educational, and clinical research. While qualitative methods are typically
used in a case study research design, quantitative methods are also occasionally employed.
Case studies are useful for outlining, contrasting, assessing, and comprehending various facets
of a research issue. (McCombes, 2019)

38 FAREED MOHAMMATHU FAIROOS CRP


3.1.3.3 Experiment
Making a set of procedures to methodically test a hypothesis is known as experimental design.
A thorough understanding of the system you are researching is necessary for a successful
experimental design. (Bevans., 2019)

3.1.3.4 Ethnography
To closely watch people's behavior and interactions, ethnography is a sort of qualitative study
that entails becoming fully immersed in a specific community or organization. The written
summary of the study that the ethnographer provides later is also referred to as ethnography. It
is possible to get a comprehensive grasp of a group's common culture, traditions, and social
dynamics using the flexible research approach of ethnography. But there are also some moral
and practical difficulties with it. (Caulfield, 2020)

Reason for choosing to Survey do the research


A research strategy is the detailed plan of action that guides the researcher's thought process.
Survey research is the practice of doing research through questionnaires that are sent to survey
participants. The survey technique, which has the capacity to collect a sizable amount of data
that will be employed in the statistical analysis section, might be thought of as the result of the
deductive approach. Additionally, all the information gathered makes it possible to find the
answers quickly and effectively to the study questions and hypotheses. After then, statistical
analysis is performed on the survey data to provide meaningful research findings. Applied this
technique to gather all data about security issues with remote work.

3.1.4 Research Choices

As potential options for doing research, the research onion proposes mono-method, mixed-
method, and multi-method. A single technique is used for the investigation in a mono-method.
The mixed method, which is based on combining two or more research techniques, is
frequently used to describe the use of qualitative and quantitative approach. The multi-method,
in addition, employs a larger range of techniques.

39 FAREED MOHAMMATHU FAIROOS CRP


3.1.4.1 Mixed Methods
To answer your research issue, mixed methodologies research incorporates aspects of
qualitative and quantitative research. In comparison to a solitary quantitative or qualitative
study, using mixed techniques can provide you a more comprehensive picture since they
include the advantages of each. (George, 2020)

3.1.4.2 Mono Method


A study that uses only one methodology, be it quantitative or qualitative, is referred to as
monomethod. In a quantitative study, the data is typically presented in numerical form, and this
information is analysed using techniques for quantitative data analysis.

3.1.4.3 Multi Method


When two or more research projects are carried out, each complete, to address research
questions and or hypotheses, a subject, or a program, this is referred to as using multiple
techniques, also known as a multi-method design. Like mixed methods, the investigations may
combine quantitative, qualitative, or both types of methodologies. Both concurrent and
sequential project implementation options are available. (Martha, 2007)

Reason for choosing to Mono Method do the research


Here, a survey-based research project is intended to be carried out using all the data acquired.
These statistics are based on just one technique. The term "numerical analysis" or "quantitative
analysis" refers to this technique. The mono-method is thus preferred to carry out this task
during the investigation. The other methodologies, such mixed-method and multi-method, are
appropriate for studies that use the qualitative analysis approach. But in this case, a quantitative
analysis was used in the investigation. Mixed-method and multi-method approaches are thus
inappropriate for this research.

40 FAREED MOHAMMATHU FAIROOS CRP


3.1.5 Research Time Horizon

It refers to the length of the research's time. Cross-sectional and longitudinal observations are
the two main categories that may be made based on time horizons. When all the observations
are for a single moment in time, as in most surveys, cross-sectional data is employed.
Contrarily, longitudinal data refers to observations for a given variable that are present over a
period of multiple years, quarters, months, or days.

3.1.5.1 Cross-sectional studies


To answer a research question, a study can be conducted in which data are only collected once,
possibly over the course of days, weeks, or months. Cross-sectional or one-shot studies are
what these studies are known as. (Chat, 2016)

3.1.5.2 Longitudinal studies


To better understand certain phenomena or people, the researcher may choose to examine them
at various points in time. For instance, to determine the effects of a change in top management,
the researcher may want to compare employee behaviour before and after the change. Here,
the study is longitudinal rather than cross-sectional because data were collected at two different
points in time. (Chat, 2016)

Reason for choosing to Cross-Sectional do the research


Cross-sectional or short-term studies, which entail gathering data at a certain moment, are
specified in this layer. Long-term studies, which require gathering data over an extended period
to compare data, are also specified. The place chosen by the researcher for the study need not
be often visited. as the survey approach will be used to gather all future data. The researcher
can gather data using the longitudinal technique by keeping a long-term record of the
population they have chosen. Cross-sectional research looks at information from several people
at one period. Utilize this to choose the precise period for gathering data on security issues
associated with working remotely. because it enables the researcher to do study with a given
demographic just once.

41 FAREED MOHAMMATHU FAIROOS CRP


3.2 Data Collection and Analysis
The methods and strategies employed make up the top layer of the research onion. It is used to
discuss the methods and objectives of the research in detail. The choice between primary and
secondary data, as well as between qualitative and quantitative data gathered from various
sources, is expected of the student at this point. In the research onion framework, data is
regarded as the key component.

3.2.1 Data Collection


The process of gathering, measuring, and analysing precise insights for research using
accepted, established methods is known as data collection. To identify solutions to the research
problem, test the hypothesis (if you're using a deductive method), and assess the results, data
collection is the act of gathering information from all relevant sources. Secondary and main
methods of data collecting can be used to categorize various data collection techniques.
Depending on the type of data needed, different fields of study require different approaches to
data collection. (Dudovskiy, 2008)

1. Primary Data Collation: This actual, first-hand data was gathered by the data
researchers, as the name suggests. Before anybody conducts any more or connected study,
this procedure is the initial information collecting stage. If the researcher gathers the data,
outcomes from primary data are quite accurate. The disadvantage of first-hand research is
that it could be time consuming and expensive. (simplilearn, 2021)
Primary Data Collection

• Interviews
A sizable sample of people are surveyed by the researcher, either through in-person
interviews or other forms of mass contact like phone or mail. This approach is by far the
most typical way to collect data.

• Projective Data Gathering


When potential respondents are aware of the purpose of the questions being posed and are
reluctant to respond, an indirect interview method called projective data collection is used.
For instance, if a representative from a cell phone carrier asks them questions about their
phone service, the person might be hesitant to respond. With projective data collection,
the interviewees are given an incomplete question and are required to fill in the blanks
with their thoughts, emotions, and attitudes.

42 FAREED MOHAMMATHU FAIROOS CRP


• Delphi Technique
According to Greek mythology, the Oracle at Delphi was the chief priestess of Apollo's
temple and a source of counsel, prophecy, and guidance. When acquiring data, researchers
employ the Delphi method by consulting a group of subject-matter experts. Each specialist
provides answers to questions pertaining to their area of expertise, and the responses are
combined to form a single view.

• Focus Groups
Focus groups are employed frequently, much like interviews. A moderator gathers the
group, which could number between six and twelve people, to discuss the topic.

• Questionnaires
A straightforward, easy-to-use approach of gathering data is through questionnaires. A
series of open-ended or closed-ended questions on the topic at hand are presented to the
respondents.
2. Secondary Data Collection: Data that has previously undergone statistical analysis and
is second-hand is referred to as secondary data. This information is either information the
researcher has looked up on their own or information they have given others the task of
gathering. It is, to put it simply, second-hand information. Secondary information raises
questions about accuracy and authenticity even though it is simpler and less expensive to
obtain than primary information. Most secondary data is quantitative.
Unlike primary data collection, there are no specific collection methods. Instead, since the
information has already been collected, the researcher consults various data sources, such
as:

• Financial Statements

• Sales Reports

• Retailer/Distributor/Deal Feedback

• Customer Personal Information (e.g., name, address, age, contact info)

• Business Journals

• Government Records (e.g., census, tax records, Social Security info)

• Trade/Business Magazines

• The internet

43 FAREED MOHAMMATHU FAIROOS CRP


Reason for choosing to Primary Data do the research
In this study, primary data collection was used to acquire data for the study rather than using
already-existing data. This information was chosen directly and recently from the chosen
population to conduct this study. To conduct the survey technique and gather the data, a
questionnaire was created and will be distributed to the selected group of people. because the
research's accuracy will be improved by adopting this strategy.

3.2.2 Data Analysis

Collecting, modelling, and analysing data to derive insights that help decision-making is the
process of data analysis. Various methods and procedures exist for doing analysis, depending
on the field and the objective of the inquiry.
Both quantitative and qualitative research serve as the foundation for all these different
methodologies.
Quantitative Analysis: Quantitative research methods emphasize objective measurements and
the statistical, mathematical, or numerical analysis of data collected through polls,
questionnaires, and surveys, or by manipulating pre-existing statistical data using
computational techniques. Quantitative research focuses on gathering numerical data and
generalizing it across groups of people or to explain a particular phenomenon. The final written
report has a set structure consisting of introduction, literature and theory, methods, results, and
discussion. (Ware, 2022)

Qualitative research methods: Qualitative research methods are created in such a way that
they may disclose a target audience's behaviour and perceptions in relation to a certain issue.
In-depth interviews, focus groups, ethnographic research, content analysis, and case study
research are examples of qualitative research methodologies that are commonly utilized.
Qualitative techniques produce more detailed findings, and conclusions may be formed from
the data with relative ease. The social and behavioural sciences are where qualitative research
methodologies started. Our world has become increasingly convoluted in recent years, making
it harder to comprehend what individuals believe and perceive. Because it is more
conversational and descriptive, online qualitative research methodologies make it simpler to
comprehend. (Questionpro, 2009)

44 FAREED MOHAMMATHU FAIROOS CRP


Reason for choosing Quantitative Analysis to do the research
Numerical data were used in this study. The collected information is based on numerical values.
Because of this, the quantitative data analysis method was used to analyse the data. mainly
because numerical data is dealt with using quantitative analysis. Statistical Package for the
Social Sciences (SPSS) is a specialized piece of software that is utilized to do this analytical
task in the research.

3.3 Population and Sampling


Researcher has picked the private banks and public banks for populations. An appropriate
simple random sample has been drawn from the Banking Sector that make up the work
population, according to the study sample 30 reached from 2 private based bank and 2 Public
based Bank
Table 2 Population and Sampling
NO Banks Population Samples (10-15%)
01 Peoples Bank 100 10
02 Bank of Ceylon 105 10

03 Commercial Bank 65 5
04 Amana Bank 50 5
Total 320 30

3.4 Role of Researcher


The researcher demonstrates how to do quantitative research to others by using a conceptual
model that clarifies the systematic purpose of the quantitative investigation.

3.5 Generalizability
The topic of my study, the results, and their applicability to related industries and social
contexts can all be generalized from one study to the next under equivalent theoretical
conditions. This paper Evaluate the impact of online security on improving remote working
among team working in banking industry during the pandemic This paper can be expanded for
further research.

45 FAREED MOHAMMATHU FAIROOS CRP


3.6 Reliability and Validity
Reliability and validity are used to evaluate the efficacy of questionnaire-based research. Given
that it is a unique examination of how to increase remote teamwork while maintaining online
security in the banking sector

3.7 Conceptual Framework

Figure 4 Conceptual Framework

3.8 Hypothesis Statement


H0: There is no significant relationship between Device Security production on online security
among the banking industry
H1: There is a significant relationship between Device Security production on online security
among the banking industry

H0: There is no significant relationship between Perceptions of the key challenge on online
security among the banking Industry
H1: There is a significant relationship between Perceptions of the key challenge on online
security among the banking Industry

46 FAREED MOHAMMATHU FAIROOS CRP


3.9 Ethical Consideration
One of the most crucial components of the research is ethical constrains. It assists in the
preservation of research participants privacy. Which must be ensured. this investigation was
done without consideration to likes and dislikes, gender, age, or any other aspect.

3.10 Timeline

Figure 5Timeline

47 FAREED MOHAMMATHU FAIROOS CRP


CONCLUSION
This assignment is in accordance with the findings that have been thoroughly examined in
relation to the issues mentioned in the assignment script and clarified by the researcher. From
the standpoint of appropriate research papers, this study should be taken into consideration
because it has been presented with adequate substantiation and several other conduct criteria.
The study's aim was to investigate the effects of security concerns on workers in Banking
Sector. The effect that was found at the study problem was that security challenges had an
overall positive impact on working remotely in Banking Sector. For Banks, the effects of
security issues included a loss of productivity, data loss, an unsafe environment, problems with
employee trust, and a decline in revenue.
The survey found that security concerns when working remotely have a significant impact on
Banking Industry, but the next step is to identify the security concerns' root causes. Security
concerns, an unstable environment, and a pandemic situation were the three independent
variables that the researcher used a quantitative research method and research methodology to
identify.

48 FAREED MOHAMMATHU FAIROOS CRP


REFERENCES

References

15writers, 2012. [Online]


Available at: https://15writers.com/research-
onion/#:~:text=The%20research%20onion%20suggests%20mono,of%20qualitative%20and
%20quantitative%20methodology.
[Accessed 05 08 2022].
Bevans., R., 2019. [Online]
Available at: https://www.scribbr.com/methodology/experimental-design/
[Accessed 06 08 2022].
Burke, S., 2018. [Online]
Available at: https://www.crn.com/news/cloud/coronavirus-is-creating-a-global-work-at-
home-culture
[Accessed 26 07 2022].
Butakhieo, N., 2019. [Online]
Available at: https://www.tandfonline.com/doi/full/10.1080/25741292.2020.1863560
[Accessed 22 07 2022].
Caulfield, J., 2020. [Online]
Available at: https://www.scribbr.com/methodology/ethnography/
[Accessed 08 08 2022].
Chat, L., 2016. [Online]
Available at: https://kalyaneynath.wordpress.com/2016/06/02/time-horizon-cross-sectional-
versus-longitudinal-studies/
[Accessed 11 08 2022].
Dudovskiy, J., 2008. [Online]
Available at: https://research-methodology.net/research-methods/data-collection/
[Accessed 13 08 2022].
Dudovskiy, J., 2011. [Online]
Available at: https://research-methodology.net/research-philosophy/
[Accessed 02 08 2022].

49 FAREED MOHAMMATHU FAIROOS CRP


Dudovskiy, J., 2011. [Online]
Available at: https://research-methodology.net/research-philosophy/positivism/
[Accessed 03 08 2022].
Dudovskiy, J., 2019. [Online]
Available at: https://research-methodology.net/research-methodology/research-
approach/deductive-approach-2/
[Accessed 04 08 2022].
formplus, 2021. [Online]
Available at: https://www.formpl.us/blog/survey-methods
[Accessed 06 08 2022].
Gardian, T., 2017. [Online]
Available at: https://www.theguardian.com/business/2017/sep/25/deloitte-hit-by-cyber-
attack-revealing-clients-emails
George, T., 2020. [Online]
Available at: https://www.scribbr.com/methodology/ethnography/
[Accessed 10 08 2022].
IJRAR, 2019. [Online]
Available at: https://www.ijrar.org/papers/IJRAR1CBP189.pdf
[Accessed 28 07 2022].
Inglet, 2020. [Online]
Available at: https://www.ktvb.com/article/news/crime/its-just-ballooning-up technology-
experts-warn-against-increasing-cyber-security-threats-covid-19-pandemic/newswatch
Martha, 2007. [Online]
Available at:
https://www.scielo.br/j/rlae/a/v4vvLRXGjSqrLLfZSMPbyfs#:~:text=Multiple%20methods
%2C%20or%20multi%2Dmethod,%2C%20qualitative%20methods%2C%20or%20both.
[Accessed 10 08 2022].
McCombes, S., 2019. [Online]
Available at: https://www.scribbr.com/methodology/case-study/
[Accessed 06 08 2022].
Peter C Whybrow, a. T. G., 2018. [Online]
Available at: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7927777/
[Accessed 20 07 2022].

50 FAREED MOHAMMATHU FAIROOS CRP


Phair, D., 2020. [Online]
Available at: https://gradcoach.com/saunders-research-
onion/#:~:text=Saunders'%20(2007)%20Research%20Onion,any%20other%20formal%20r
esearch%20project.
[Accessed 02 08 2022].
Presidency, I., 2021. [Online]
Available at: https://www.ilo.org/wcmsp5/groups/public/---dgreports/---
ddg_p/documents/publication/wcms_791858.pdf
[Accessed 17 11 2022].
Questionpro, 2009. [Online]
Available at: https://www.questionpro.com/blog/qualitative-research-methods/
[Accessed 14 08 2022].
Salah, M. A. K. a. K., 2018. [Online].
simplilearn, 2021. [Online]
Available at: https://www.simplilearn.com/what-is-data-collection-article
[Accessed 13 08 2022].
Viljoin, 2018. [Online]
Available at: https://www2.deloitte.com/au/en/pages/risk/articles/cybercrime-tech-
problem.html
voxco, 2018. [Online]
Available at: https://www.voxco.com/blog/what-is-research-methodology/
[Accessed 02 08 2022].
Ware, s., 2022. [Online]
Available at: https://lib-
guides.letu.edu/quantresearch#:~:text=Quantitative%20Research%20Definition
[Accessed 14 08 2022].
Wolf, E., 2021. [Online]
Available at: https://libanswers.snhu.edu/faq/264001
[Accessed 01 12 2022].

51 FAREED MOHAMMATHU FAIROOS CRP

You might also like