SlideShare ist ein Scribd-Unternehmen logo
1 von 27
The application of mixed method in
developing a cyber terrorism framework
Presented By:-
Ajay Kumar Koduri
Bhavana Atluri
Manasa Sutram
Shaayendra Raju
Authors:-
Rabiah Ahmad, Zahri Yunos
â–  Cyber Terrorism - Introduction
â–  Objective
â–  Mixed-method research
â–  Knowledge-management architecture
â–  Grounded-theory framework
â–  Research methodology framework
â–  Data collection and analysis framework
â–  Conclusion
Overview
Cyber Terrorism
Cyber - Anything that involved
computer resources and
information.
Terrorism - An act of violence.
Cyber Terrorism
History Of Attacks
â–  Cyberterrorism is the premeditated, politically motivated attack against information, computer
systems, computer programs, and data which result in violence against noncombatant targets by
sub-national groups or clandestine agents. - by TechTarget
â–  Cyberterrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and
threats of attacks against computers, networks and the information stored therein when done to
intimidate or coerce a government or its people in furtherance of political or social objectives. - by
Gabriel Weiman in United Institute of Peace report.
â–  The premeditated use of disruptive activities, or the threat thereof, against computers and/or
networks, with the intention to cause harm or further social, ideological, religious, political or similar
objectives. Or to intimidate any person in furtherance of such objectives. - Wikipedia
Cyber Terrorism definitions
There are various reasons why cyber attacks are an attractive choice for terrorists.
Few of them are:
â–  No need to cross physical barrier.
â–  Identity is kept a secret.
â–  Easy to attack.
â–  Fast flow of information.
â–  Little or no regulation.
â–  Huge audience.
Motivations of Cyber-Terrorists
This paper has two primary goals.
They are :
1. Develop a conceptual framework for cyber terrorism.
2. Verification of this conceptual framework.
Goal of the paper
Mixed method research is a combination of two types of research methodologies.
Methodologies :
1. Qualitative research methodology and
2. Quantitative research methodology
Mixed-Method Research
Qualitative Research methodology
â–  It is primarily interpretive research technique.
â–  It is used to gain an understanding of underlying reasons, opinions, and
motivations.
â–  It provides insights into the problem or helps to develop ideas or hypotheses for
potential quantitative research.
Advantages:
It allows for the discovery of new ideas.
Used to build a theory around a particular phenomena or process.
Here the phenomena is “Cyber-
Terrorism”.
â–  It is primarily a validating technique.
â–  It is used for testing or verification of conceptual framework that describes the
phenomena via statistical, mathematical or computational techniques.
Advantages
For achieving precise measurement of participants behaviour or knowledge.
Quantitative Research methodology
Suitability of Mixed Method Research
Mixed method approach helps to answer questions that cannot be answered by
qualitative or quantitative approaches alone.
â–  Qualitative research approaches seek to explore phenomena
â–  Quantitative research approaches seek to confirm hypotheses about
phenomena.
By unifying both the methodologies, strengths are amplified and weaknesses are
lessened.
It is also able to answer broader and more complete range of research problems
in a study.
Knowledge Management Architecture
The development of conceptual framework describing cyber terrorism is done by
using the grounded theory method.
Grounded theory method :
It is a step-by-step process that involves generating a conceptual model (or
theory) that is grounded in the data.
Egan’s grounded theory framework.
There are multiple architectures for grounded theory approach. The authors
choose to adopt the Egan’s recommendation.
Step 1 - Initiation of Research
â–  Involves the selection of an area of inquiry.
â–  The research begins with an awareness of the context of the research by
reviewing literatures relevant to the area of inquiry.
â–  Involves the identification of potential data sources associated with the
research questions.
â–  The respondents are chosen from various expert positions to reflect variety of
expertise.
Step 2 - Data Selection
Step 3 - Data Collection
â–  Initiation of data collection from targeted respondents.
â–  It is an ongoing process, whereby the researcher can return to the
interviewees for clarification and elaboration.
â–  Also compares related documents or records with data collected in the initial
stage of the research.
Step 4 - Data Analysis
â–  Involves a constant comparison method for generating and analyzing data.
â–  It is a process of systematically searching and arranging the interview
transcripts, field notes and other materials with the objectives to increase the
understanding.
Step 5 - Concluding the research
â–  Involves documenting the grounded theory based on researcher observation
of the data saturation and sufficient theory which has emerged from the data.
Data saturation: It is the evident when data collection no longer contributes to
elaboration of the phenomenon.
Once the theory discovery and conceptual framework have been developed, the
next stage is to test or verify the conceptual framework.
The framework of research methodology
To achieve theory discovery and verification within a single research project, the
Quantitative and Qualitative methodologies are used together.
By combining both the research methods, validated conceptual framework for
Cyber terrorism was developed.
The framework of research methodology
Framework of data collection and Analysis
Conclusion
â–  The study of understanding similarities and differences in perception of what
constitutes cyber terrorism can provide insight on the concept of cyber
terrorism.
â–  The outcome of this study serves the basis for various strategic decisions for
policy and decision makers as well as useful foundation for academic
research.
â–  The paper describes the framework of research methodology, where the
combination of Qualitative and Quantitative techniques are combined to
discover the theory around a phenomenon and to verify it.
Relevance to our project - Project proposal
Our project focuses on the methods to improve the efficiency of existing
techniques to identify potentially harmful websites.
To increase the performance of existing techniques we propose to use image
analysis techniques like pixel comparison in addition to text analysis.
Relevance to our project
â–  To collect the text and image sources, we can use mixed-research method
to construct a framework and verify it.
â–  Once the websites are identified, it is easy to identify people connected with
them and after further analysis we should be able to collect more quality data
about the terrorist recruitments, financial aid that helps in understanding
perception management.
â–  Once we are able to discover the potential victims (i.e,) the people who are
being influenced, we can use the grounded-theory method to develop a
framework for perception management .
Greedy-mixed method
1. Define the challenge.
2. Collect appropriate data from any relevant source to develop and test
hypotheses.
3. Rigorously examine those data for obvious and hidden patterns.
4. Analyze the findings.
5. Present the results for peer review and audience education.
Thank you!

Weitere ähnliche Inhalte

Ă„hnlich wie kumar.pptx

Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodologyASIM MANZOOR
 
one of the best Research Methods in Criminal Justice updated 2023 doc 3.docx
one of the best Research Methods in Criminal Justice updated 2023 doc 3.docxone of the best Research Methods in Criminal Justice updated 2023 doc 3.docx
one of the best Research Methods in Criminal Justice updated 2023 doc 3.docxintel-writers.com
 
Qualitative data analysis_ Software_ Quality issues _ 2023.pptx
Qualitative data analysis_ Software_ Quality issues _ 2023.pptxQualitative data analysis_ Software_ Quality issues _ 2023.pptx
Qualitative data analysis_ Software_ Quality issues _ 2023.pptxTayeDosane
 
05) marketing research design
05) marketing research design05) marketing research design
05) marketing research designSyed Osama Rizvi
 
Thematic Analysis for Qualitative Research.pptx
Thematic Analysis for Qualitative Research.pptxThematic Analysis for Qualitative Research.pptx
Thematic Analysis for Qualitative Research.pptxPavaniPrabhaTanaji
 
research
researchresearch
researchChoi Chua
 
research design
 research design research design
research designkpgandhi
 
Introduction research(1).pptx
Introduction research(1).pptxIntroduction research(1).pptx
Introduction research(1).pptxAlmaAtakeluargaAA
 
Basics of research in research methodology
Basics of research in research methodologyBasics of research in research methodology
Basics of research in research methodologyShajun Nisha
 
Collecting, analyzing, and interpreting qualitative data
Collecting, analyzing, and interpreting qualitative dataCollecting, analyzing, and interpreting qualitative data
Collecting, analyzing, and interpreting qualitative databclassengdept
 
Introduction to quantitative research design
Introduction to quantitative research designIntroduction to quantitative research design
Introduction to quantitative research designAtmaRamBhattarai
 
Business research methods
Business  research methodsBusiness  research methods
Business research methodsHanumant singh
 
IFY_SSc_Lecture3_Intro_Social Science.pptx
IFY_SSc_Lecture3_Intro_Social Science.pptxIFY_SSc_Lecture3_Intro_Social Science.pptx
IFY_SSc_Lecture3_Intro_Social Science.pptxEyalClyne
 
RD_Online-ToT_Module-2.1-2.2_Research-methods.pptx
RD_Online-ToT_Module-2.1-2.2_Research-methods.pptxRD_Online-ToT_Module-2.1-2.2_Research-methods.pptx
RD_Online-ToT_Module-2.1-2.2_Research-methods.pptxCristelAnnVerayoDesc
 
Rd online to-t_module-2.1-2.2_research-methods
Rd online to-t_module-2.1-2.2_research-methodsRd online to-t_module-2.1-2.2_research-methods
Rd online to-t_module-2.1-2.2_research-methodsSaadiaMahmood3
 
BRM Research Outline, Ch 1-7 NEW.pptx
BRM Research Outline, Ch 1-7 NEW.pptxBRM Research Outline, Ch 1-7 NEW.pptx
BRM Research Outline, Ch 1-7 NEW.pptxHaleemaAbdella
 
chapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptx
chapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptxchapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptx
chapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptxvenuspatatag4
 
Chapter 4 Understanding Data and Ways to Systematically Collect Data
Chapter 4   Understanding Data and Ways to Systematically Collect DataChapter 4   Understanding Data and Ways to Systematically Collect Data
Chapter 4 Understanding Data and Ways to Systematically Collect DataCarla Kristina Cruz
 

Ă„hnlich wie kumar.pptx (20)

Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
 
one of the best Research Methods in Criminal Justice updated 2023 doc 3.docx
one of the best Research Methods in Criminal Justice updated 2023 doc 3.docxone of the best Research Methods in Criminal Justice updated 2023 doc 3.docx
one of the best Research Methods in Criminal Justice updated 2023 doc 3.docx
 
Qualitative data analysis_ Software_ Quality issues _ 2023.pptx
Qualitative data analysis_ Software_ Quality issues _ 2023.pptxQualitative data analysis_ Software_ Quality issues _ 2023.pptx
Qualitative data analysis_ Software_ Quality issues _ 2023.pptx
 
05) marketing research design
05) marketing research design05) marketing research design
05) marketing research design
 
Thematic Analysis for Qualitative Research.pptx
Thematic Analysis for Qualitative Research.pptxThematic Analysis for Qualitative Research.pptx
Thematic Analysis for Qualitative Research.pptx
 
research
researchresearch
research
 
research design
 research design research design
research design
 
Introduction research(1).pptx
Introduction research(1).pptxIntroduction research(1).pptx
Introduction research(1).pptx
 
Lecture # 5 nilat (jan 2nd 2018)
Lecture # 5 nilat (jan 2nd 2018)Lecture # 5 nilat (jan 2nd 2018)
Lecture # 5 nilat (jan 2nd 2018)
 
Basics of research in research methodology
Basics of research in research methodologyBasics of research in research methodology
Basics of research in research methodology
 
Collecting, analyzing, and interpreting qualitative data
Collecting, analyzing, and interpreting qualitative dataCollecting, analyzing, and interpreting qualitative data
Collecting, analyzing, and interpreting qualitative data
 
Introduction to quantitative research design
Introduction to quantitative research designIntroduction to quantitative research design
Introduction to quantitative research design
 
Business research methods
Business  research methodsBusiness  research methods
Business research methods
 
IFY_SSc_Lecture3_Intro_Social Science.pptx
IFY_SSc_Lecture3_Intro_Social Science.pptxIFY_SSc_Lecture3_Intro_Social Science.pptx
IFY_SSc_Lecture3_Intro_Social Science.pptx
 
RD_Online-ToT_Module-2.1-2.2_Research-methods.pptx
RD_Online-ToT_Module-2.1-2.2_Research-methods.pptxRD_Online-ToT_Module-2.1-2.2_Research-methods.pptx
RD_Online-ToT_Module-2.1-2.2_Research-methods.pptx
 
Rd online to-t_module-2.1-2.2_research-methods
Rd online to-t_module-2.1-2.2_research-methodsRd online to-t_module-2.1-2.2_research-methods
Rd online to-t_module-2.1-2.2_research-methods
 
BRM Research Outline, Ch 1-7 NEW.pptx
BRM Research Outline, Ch 1-7 NEW.pptxBRM Research Outline, Ch 1-7 NEW.pptx
BRM Research Outline, Ch 1-7 NEW.pptx
 
Sample Methodology Essay
Sample Methodology EssaySample Methodology Essay
Sample Methodology Essay
 
chapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptx
chapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptxchapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptx
chapter4-understandingdataandwaystosystematicallycollectdata-170809052400.pptx
 
Chapter 4 Understanding Data and Ways to Systematically Collect Data
Chapter 4   Understanding Data and Ways to Systematically Collect DataChapter 4   Understanding Data and Ways to Systematically Collect Data
Chapter 4 Understanding Data and Ways to Systematically Collect Data
 

Mehr von sheryl90

competitive advantage (1).ppt
competitive advantage (1).pptcompetitive advantage (1).ppt
competitive advantage (1).pptsheryl90
 
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxStrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxsheryl90
 
Chapter10_mis.ppt
Chapter10_mis.pptChapter10_mis.ppt
Chapter10_mis.pptsheryl90
 
83172_pp7.ppt
83172_pp7.ppt83172_pp7.ppt
83172_pp7.pptsheryl90
 
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptwipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptsheryl90
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptsheryl90
 
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptxsheryl90
 
competitive advantage.ppt
competitive advantage.pptcompetitive advantage.ppt
competitive advantage.pptsheryl90
 
shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfshidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfsheryl90
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.pptsheryl90
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptsheryl90
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptsheryl90
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxsheryl90
 
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptwipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptsheryl90
 
Technology technology.ppt
Technology technology.pptTechnology technology.ppt
Technology technology.pptsheryl90
 
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdftypesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdfsheryl90
 
IS-Overview.ppt
IS-Overview.pptIS-Overview.ppt
IS-Overview.pptsheryl90
 
ch03.ppt
ch03.pptch03.ppt
ch03.pptsheryl90
 
ch01_02.ppt
ch01_02.pptch01_02.ppt
ch01_02.pptsheryl90
 

Mehr von sheryl90 (19)

competitive advantage (1).ppt
competitive advantage (1).pptcompetitive advantage (1).ppt
competitive advantage (1).ppt
 
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxStrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptx
 
Chapter10_mis.ppt
Chapter10_mis.pptChapter10_mis.ppt
Chapter10_mis.ppt
 
83172_pp7.ppt
83172_pp7.ppt83172_pp7.ppt
83172_pp7.ppt
 
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptwipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).ppt
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
 
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
 
competitive advantage.ppt
competitive advantage.pptcompetitive advantage.ppt
competitive advantage.ppt
 
shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfshidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdf
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
 
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptwipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.ppt
 
Technology technology.ppt
Technology technology.pptTechnology technology.ppt
Technology technology.ppt
 
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdftypesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdf
 
IS-Overview.ppt
IS-Overview.pptIS-Overview.ppt
IS-Overview.ppt
 
ch03.ppt
ch03.pptch03.ppt
ch03.ppt
 
ch01_02.ppt
ch01_02.pptch01_02.ppt
ch01_02.ppt
 

KĂĽrzlich hochgeladen

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

KĂĽrzlich hochgeladen (20)

4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

kumar.pptx

  • 1. The application of mixed method in developing a cyber terrorism framework Presented By:- Ajay Kumar Koduri Bhavana Atluri Manasa Sutram Shaayendra Raju Authors:- Rabiah Ahmad, Zahri Yunos
  • 2. â–  Cyber Terrorism - Introduction â–  Objective â–  Mixed-method research â–  Knowledge-management architecture â–  Grounded-theory framework â–  Research methodology framework â–  Data collection and analysis framework â–  Conclusion Overview
  • 3. Cyber Terrorism Cyber - Anything that involved computer resources and information. Terrorism - An act of violence.
  • 6. â–  Cyberterrorism is the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents. - by TechTarget â–  Cyberterrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. - by Gabriel Weiman in United Institute of Peace report. â–  The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives. - Wikipedia Cyber Terrorism definitions
  • 7. There are various reasons why cyber attacks are an attractive choice for terrorists. Few of them are: â–  No need to cross physical barrier. â–  Identity is kept a secret. â–  Easy to attack. â–  Fast flow of information. â–  Little or no regulation. â–  Huge audience. Motivations of Cyber-Terrorists
  • 8. This paper has two primary goals. They are : 1. Develop a conceptual framework for cyber terrorism. 2. Verification of this conceptual framework. Goal of the paper
  • 9. Mixed method research is a combination of two types of research methodologies. Methodologies : 1. Qualitative research methodology and 2. Quantitative research methodology Mixed-Method Research
  • 10. Qualitative Research methodology â–  It is primarily interpretive research technique. â–  It is used to gain an understanding of underlying reasons, opinions, and motivations. â–  It provides insights into the problem or helps to develop ideas or hypotheses for potential quantitative research. Advantages: It allows for the discovery of new ideas. Used to build a theory around a particular phenomena or process. Here the phenomena is “Cyber- Terrorism”.
  • 11. â–  It is primarily a validating technique. â–  It is used for testing or verification of conceptual framework that describes the phenomena via statistical, mathematical or computational techniques. Advantages For achieving precise measurement of participants behaviour or knowledge. Quantitative Research methodology
  • 12. Suitability of Mixed Method Research Mixed method approach helps to answer questions that cannot be answered by qualitative or quantitative approaches alone. â–  Qualitative research approaches seek to explore phenomena â–  Quantitative research approaches seek to confirm hypotheses about phenomena. By unifying both the methodologies, strengths are amplified and weaknesses are lessened. It is also able to answer broader and more complete range of research problems in a study.
  • 13. Knowledge Management Architecture The development of conceptual framework describing cyber terrorism is done by using the grounded theory method. Grounded theory method : It is a step-by-step process that involves generating a conceptual model (or theory) that is grounded in the data.
  • 14. Egan’s grounded theory framework. There are multiple architectures for grounded theory approach. The authors choose to adopt the Egan’s recommendation.
  • 15. Step 1 - Initiation of Research â–  Involves the selection of an area of inquiry. â–  The research begins with an awareness of the context of the research by reviewing literatures relevant to the area of inquiry.
  • 16. â–  Involves the identification of potential data sources associated with the research questions. â–  The respondents are chosen from various expert positions to reflect variety of expertise. Step 2 - Data Selection
  • 17. Step 3 - Data Collection â–  Initiation of data collection from targeted respondents. â–  It is an ongoing process, whereby the researcher can return to the interviewees for clarification and elaboration. â–  Also compares related documents or records with data collected in the initial stage of the research.
  • 18. Step 4 - Data Analysis â–  Involves a constant comparison method for generating and analyzing data. â–  It is a process of systematically searching and arranging the interview transcripts, field notes and other materials with the objectives to increase the understanding.
  • 19. Step 5 - Concluding the research â–  Involves documenting the grounded theory based on researcher observation of the data saturation and sufficient theory which has emerged from the data. Data saturation: It is the evident when data collection no longer contributes to elaboration of the phenomenon. Once the theory discovery and conceptual framework have been developed, the next stage is to test or verify the conceptual framework.
  • 20. The framework of research methodology To achieve theory discovery and verification within a single research project, the Quantitative and Qualitative methodologies are used together. By combining both the research methods, validated conceptual framework for Cyber terrorism was developed.
  • 21. The framework of research methodology
  • 22. Framework of data collection and Analysis
  • 23. Conclusion â–  The study of understanding similarities and differences in perception of what constitutes cyber terrorism can provide insight on the concept of cyber terrorism. â–  The outcome of this study serves the basis for various strategic decisions for policy and decision makers as well as useful foundation for academic research. â–  The paper describes the framework of research methodology, where the combination of Qualitative and Quantitative techniques are combined to discover the theory around a phenomenon and to verify it.
  • 24. Relevance to our project - Project proposal Our project focuses on the methods to improve the efficiency of existing techniques to identify potentially harmful websites. To increase the performance of existing techniques we propose to use image analysis techniques like pixel comparison in addition to text analysis.
  • 25. Relevance to our project â–  To collect the text and image sources, we can use mixed-research method to construct a framework and verify it. â–  Once the websites are identified, it is easy to identify people connected with them and after further analysis we should be able to collect more quality data about the terrorist recruitments, financial aid that helps in understanding perception management. â–  Once we are able to discover the potential victims (i.e,) the people who are being influenced, we can use the grounded-theory method to develop a framework for perception management .
  • 26. Greedy-mixed method 1. Define the challenge. 2. Collect appropriate data from any relevant source to develop and test hypotheses. 3. Rigorously examine those data for obvious and hidden patterns. 4. Analyze the findings. 5. Present the results for peer review and audience education.