2BoinapallyProposal.docx

Table of ContentsCHAPTER 13Introduction3Background.3Significance of the study4Theoretical Foundations5Researcher’s Positionality8Purpose of the Study9Research Questions10Definition of the Terms10A.Cyber Security10B.Threats11C.Business Data11D.Attacks11E.Firewall11F.Authentication11G.Data Encryption11H.Hacker11I.Incident response plan12Summary and Organization of the Remainder of the Study12Chapter 112Chapter 212Chapter 312CHAPTER 2 LITERATURE REVIEW13Introduction13CHAPTER 318Research Methodology19Research Design20Study Population22Data Collection Methods23A.Face to face interviews23B.Telephone surveys23C.Online surveys24Data Analysis and Procedures24Limitations in data collection and analyzation24Validity and Reliability of the Study.26Trustworthiness of the Study28Ethical Considerations29CHAPTER 430Results30CHAPTER 531Conclusion31References33