Chapter 3 - Research Methodology
Chapter 3 - Research Methodology
Chapter 3 - Research Methodology
RESEARCH METHODOLOGY
3.1 Introduction
The increasing reliance on technology and the interconnectedness of DESD have raised
concerns regarding cybersecurity in the military. This research aims to investigate the factors that
contribute to successful cybersecurity risk management in this context. It will analyse existing
research articles and conduct survey to the employee and structured interviews with key
personnel responsible for risk management. This study explores the emerging threats faced by
DESD in terms of governance, risk management practices, culture, and awareness.
This research aims to identify the critical components of cybersecurity risk management
in DESD, analyse the emerging threats faced by DESD, and develop a framework for
cybersecurity risk management in DESD. This framework will serve as a guide for DESD to
improve their cybersecurity risk management strategies and protect sensitive information and
assets from cyber threats. By considering various sources and perspectives on risk management
in the field of cybersecurity, this research aims to enhance the comprehension of the distinct
challenges and potential benefits associated with cybersecurity risk management within DESD.
The findings of this research will provide valuable insights for DESD to enhance the
cybersecurity risk management strategies and protect against emerging threats. Additionally, it
will establish knowledge on cybersecurity risk management among employees and provide
recommendations for improving risk management practices within DESD.
3.2 Research Design
The research design of this focuses on evaluating the knowledge related to cybersecurity
threat among the employees in DESD and attempts to identify causes of cyber threat using the
quantitative and qualitative method or mix-method. For this study, the research design
harmonizes with the conceptual research problems. Moreover, the data collected from survey and
interview will answer the research question for this research. It may demonstrate the relevance of
the research issue that will be examined throughout the study design process. The activity in
research design will be elaborate the research methodology used on the scope of study. Based on
the objective, the method to analyze the data or the research design is shown in Table 3.1.
The chosen design not only serves as a guide for the research process but also establishes
a solid foundation for addressing the underlying issue. By aligning the study's design with the
problem, it seeks to solve, the research is well positioned to effectively tackle key research
questions and generate insightful findings.
Moving forward, it is crucial to delve deeper into the specifics of the research design
outlined in Table 3.1. This involves a comprehensive examination of the methodologies, data
collection techniques, and analytical frameworks that underlie the overall approach. Such a
thorough exploration will provide valuable insights into the strength and efficacy of the chosen
research design, ultimately enhancing the clarity and cohesiveness of the study.
Likewise, interviews can be susceptible to errors during data collection. Since the data is
based on personal interactions, the results are influenced by negotiation and contextual factors
(Harris and Brown, 2019). The interviewer can introduce biases through leading questions, and
both interviewers and interviewees may engage in satisficing. Additionally, the collected data
only provides a partial and constructed understanding of the interviewees' perspectives.
To ensure the comprehensibility of the questionnaire, a pilot study was conducted before
it was presented to the sample frame of this study. The collected data was subsequently analyzed
using SPSS, a software program renowned for its extensive repertoire of graphs, techniques, and
charts tailored specifically for diverse forms of statistical analysis in quantitative research. The
data screening and cleaning techniques utilized in SPSS are of great value for conducting further
analysis.
The objective of this method is to evaluate the level of cybersecurity awareness among
DESD employees, who have varying ranks, education levels, and computer skills. These records
were used for statistical analysis, which included validity and reliability tests, variable feasibility
tests, correlation tests, multicollinearity tests, multiple regression, and heteroskedasticity tests
conducted using SPSS. Questionnaires were distributed to DESD employees' WhatsApp through
an online link. The questionnaire items used in this research are listed in Table 3.2.
Serial Questionnaire
1. I frequently update my password.
2. I have different passwords for multiple websites.
3. I usually modify the default password of the administrator account.
4. I utilize wireless encryption.
5. I ensure that the firmware of the wireless gadget is regularly updated.
6. I disclose my personal information on social media platforms.
7. I have trusted social network applications.
8. I verify links before clicking on them on social networks.
9. I share my information, documents, and photos online.
10. I setup a password for accessing a shared file.
11. I reviewed the security and privacy policies of service providers.
12. I acknowledge the potential security risk associated with sending passwords via
email.
13. I am aware of the potential dangers associated with clicking on email links.
14. I am aware of the potential dangers posed by computer viruses.
15. I am aware of the potential dangers associated with email attachments.
16. I installed antivirus software for my computer.
This questionnaire can be utilized for the purpose of investigating employees' awareness,
capabilities, behavior, attitudes, and self-perception pertaining to cyber security. The respondents
were requested to choose their answers from a range of multiple-choice options, encompassing
"strongly agree," "agree," "neutral," "disagree," and "strongly disagree."
For the purpose of this study, the interview method will be utilized to obtain feedback on
current cybersecurity risk management techniques and from a specific group of experts in the
field such as threat intelligence. The process will commence by identifying participants who
meet the requirements outlined by the study. The selected individuals will receive an invitation
letter via both email and WhatsApp. Upon agreeing to participate in the research, participants
will be provided with the interview protocol and a consent letter. The interviews will be
conducted using a semi-structured format, allowing for the posing of targeted questions. All
interviews will be recorded using a smartphone in order to capture the participants' perceptions,
sentiments, and thoughts. A smartphone audio recorder will be employed for this purpose.
Following the discussions, the audio recordings will be transcribed. Once the entire interview
transcript is completed, a member checking process will be undertaken to ensure that participants
accurately recall their responses to the questions.
3.5 Validity and Reliability
Validity refers to the probability that a study will yield accurate, meaningful, and credible
findings (Hayashi et al., 2019). In more straightforward terms, validity ensures that the variables
being measured are indeed being accurately measured. To ensure validity in both quantitative
and qualitative research designs, the same individual oversaw the development of the
questionnaire and in-depth interview guides. Both guides underwent a thorough examination to
ensure consistency in wording, definitions, and alignment with the research questions.
Considering the prevalence of quantitative design, the interview guide was tailored to
align with the final questionnaire design. To minimize any factors that could potentially impact
the qualitative results, the interviews were recorded and transcribed verbatim. Additionally, this
approach was adopted for all interviews in order to avoid leading questions and biases from
influencing the informants' responses. Following each interview, an "after-action review" session
was conducted to discuss key findings and offer feedback for improvement or maintenance in
specific areas prior to the subsequent interview.
This study aims to identify the frameworks and practices that can enhance DESD
cybersecurity risk management through the analysis of surveys and interviews. It will propose an
approach to cybersecurity risk management. According to Parsola, J. (2022), a cybersecurity
management framework offers a methodical approach to managing cybersecurity risks and
implementing a comprehensive cybersecurity program in an organization. It aids organizations in
formulating strategies, policies, processes, and controls to safeguard their information systems
and data. Figure 3.1 illustrates the principal components typically present in a cybersecurity
management framework.
Moreover, the aim of this research is to identify the main causes of cyber threats and
propose the best practices for DESD employees to counter these threats while upholding the
security of sensitive data. The recommended best practices that can be implemented within the
DESD, encompass:
(a) Establishing a robust governance framework with clearly defined roles and
responsibilities for cybersecurity.
(c) Highlighting the significance of promptly identifying and reporting potential security
incidents.
(d) Installing firewalls, detection and prevention systems for intrusions, and other network
security measures to protect against unwanted access and malicious activity.
(e) Perpetually backing up essential data and rigorously testing backup processes for
reliability and efficacy.
(f) Furnishing resources such as posters, newsletters, and training materials to fortify
security awareness.
3.7 Conclusion
In this research, an analysis of cybersecurity risk management has been conducted. The
findings demonstrate that organizations are required to thoroughly examine and address
cybersecurity risks in order to protect their networks, information systems, and sensitive data
from emerging cyber threats. This research highlights the significance of understanding the
cybersecurity threat landscape, implementing risk mitigation plans, and establishing
cybersecurity management frameworks. It is evident that an awareness of and adherence to the
security guidelines for DESD are indispensable for effective cybersecurity risk management.
DESD must remain vigilant and consistently update cybersecurity protocols to effectively
combat the ever-evolving threats and changes in the technological landscape.