StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Synthesis of Systematic Analysis Results - Assignment Example

Cite this document
Summary
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful

Extract of sample "Synthesis of Systematic Analysis Results"

Download file to see previous pages The paper "Synthesis of Systematic Analysis Results" is a good example of an assignment on social science.
 

Studies

Key findings

Method & scope

Main theories & Hypothesis

Variables

Limitation/ future research

Country

Notes

Anderson J, (2010)

‘Understanding the Changing Needs of the U.S. Online Consumer’

- With how online and mobile behaviors are changing, the research sought to find effective approaches to the integration of services provided within and

between public service organizations, including the use of IT-based

platforms within Saudi Arabia

- Innovative approaches to public consultation/involvement

-The research mainly used primary data which in the case was interviewing respondents from key organizations and financial institutions within Abu Dhabi. The research identified five respondents from every organization thus expected to interview 50 respondents

The relationship between public welfare services and

social exclusion within the context of the introduction of E-services

Public welfare services and social exclusion

Limitation

The study was narrowed within specific sectors of activity (e.g. central or local government), therefore the evidence suggests that it is important to seek to establish research on wider sectors.

United Arabs Emirates (UAE)

The researcher adopted primary data since it was essential due to a large number of the respondent and the larger area which was to be covered.

Applegate (2002)

‘Million invested in fighting cybercrime around the world’

Key findings

The most appealing and distinct nature of cybercrime. The second finding was models of crime when dealing with cyber fraud and know how to investigate it.

Method

-The was the application of primary that was gathered through interviews and questionnaire

-It was also comparative research that used interviews and online surveys on workers in non-governmental and governmental organizations.

Hypothesis

-Should the government continue to spend millions in fighting cybercrime around the world?

Telecommunications and Information Technology in the Kingdom of Saudi Arabia databases

Variables

Amount of money spent (in terms of millions used) and the outcome of strategies the spent millions leverage on

Future research

While the scope of the study seemed feasible, there is a need to evaluate the feasibility of a one-stop-shop approach with other departments where there is a common customer base.

United Kingdom (UK)

Notes

A qualitative survey was done on the 20 different organizations including public and private ones

Ball, S. (2007)

‘ Bystanders and bullying: A summary of research for Anti-Bullying Week’

Key findings

The best way to take more of an enterprise-wide approach to Anti-Bullying by building a new cross-department organization with accountability and governance.

Method

The research adopted the model of testing and verifying a significant number of hypotheses and models as part of the methodology in the study.

Hypothesis

The second hypothesis was accountability and governance for service delivery

Variables

Total incidences of cyberbullying in terms of millions by UAE and the outcome of strategies

Limitation

The study population was limited to smaller region within one of the emirates hence risky

Future research

Finding better ways of integrating the research with available ways of collaboration with private

sectors’ leaders such as financial institutions.

United Arab Emirates (UAE)

Notes

-The models tested were many hence gave the research a more accurate outcome

Bandura, A. (2003)

‘Aggression: A social learning analysis’

Key findings

Strategies of proactively migrating service interactions with both citizens and businesses to a single point of entry service centers, call centers, and lower cost internet channels.

Method

Unlike previous researches adopted by the author, the research relied on secondary data where journals and articles were key sources of information.

Hypothesis

Streamlining organizational culture and its effects on the adoption of E-commerce

Variables

Business research and methodology used

Future research

In the same way that the private sector focuses on

the bottom line, future studies need to explore more on how entrepreneurialism is required to drive

government forward

Australia

Notes

The data obtained may not be able to provide the needed results since the authors in the journals cited some limitations too.

Barlinska, J., & Wojtasik, Ł. (2008)

‘Peer violence and electronic media – Research and social campaign’

Key findings

Ways of working with a broad set of third parties to consider new and

innovative means of cyber-crime including outsourcing and various public-private partnerships.

Method

The research used questionnaires and interviews to collect data from government institutions.

Hypothesis

Alignment of key government institutions was a sure way of ensuring cyber-crime free environment in the Kingdom of Saudi Arabia

Variables

Alignment of key government institutions

Future research

As the research is tailored, there is a need for multi-channel access and cyber-crime prevention options.

United Kingdom (UK)

Notes

This research was mainly built on the theoretical model of management that were formed on the basis of the quality of management

Batson, C. D. (2006).

‘The altruism question: Toward a social-psychological answer ’

Key findings

The study mainly focused on new channels of online communication social media for proactive two-way communication

The study adopted primary data collection where an online survey was the key source of information

Hypothesis

Relationship between channels of online communication and proactive two-way communication

Variables

Internets users and level of cyber-crime prevention

Future research

Government administrative and support processes are often fragmented across multiple agencies, therefore, future research needs to consider this aspect

United Kingdom (UK)

Notes

Different aspects of internet domain consortium were analyzed using secondary sources of data

Batson, et al. (2009)

‘Empathy and attitudes: Can feeling for a member of a

stigmatized group improve feelings toward the group’

Key findings

-Finding effectiveness of the just-introduced platforms such as shared services for IT colocation, e-hosting, infrastructure and

hardware and software by the

UAE Telecommunications Regulator Authority

Method

The research was comparative research adopted by interviews and online surveys.

Theory

This study’s theoretical underpinning was the effectiveness of the Ministry of Commerce E- in dealing with cyber-crime.

Variables

Effectiveness of measuring cyber-crime within the ministries in Saudi Arabia and the UK.

Future research

While a chargeback model is not currently in place, it has undertaken a benchmarking study to identify best practices.

United Arab Emirates (UAE)

Notes

The theoretical model adopted in this paper focused on the quality of service delivery and customer satisfaction

Brem (2001)

‘Some ethical considerations and resource for analyzing online discussion’

Key findings

It analyzed and brought recommendations regarding ethical issues to be considered when doing online research.

Method

Interviewing, data collection and analysis using Statistical Programme for Social Science (SPSS).

Theories

Does online research and discussion require ethical considerations when trying to avoid cases of infringement and cybercrime activities

Variables

Online discussion and Ethical considerations

Limitation

-The study only focused on strategic priorities for information technology programs and ignoring the fact that by strengthening the professionalism and skillsets of public servants, the government is able to improve the instances of cyber-crime

United States of America (USA)

Notes

The best approach that was given by the researcher was the adoption of Strategic Priorities for Information Technology Program’ which actually factored in different elements of service deliveries in public and private sectors

Casey (2002)

‘Error, Uncertainty and Loss in Digital Evidence’

Key findings

Each layer on a network normally provides an opportunity for new errors. In order to reduce incorrect conclusions based on unreliable data then it is essential for quantification of uncertainty.

Methods

It was a review of findings and other literature using logs to describe potential evidence from the uncertainty in data. The data was collected from secondary sources.

Hypothesis

The main attribute of this paper was to explore the inherent uncertainty in evidence collected from computer

Variables

Scientific method by detecting, quantifying, and compensating for errors and loss in evidence collected from networked systems.

Limitation

Recent efficiency advisory experience suggests a number of inherent poor strategies in dealing with cyber-crime. Based on this, this research failed to integrate the software breakthrough for business-to-business commerce with common mistakes done by managers

United Kingdom (UK)

Service theory and employee motivation were used in this case.

Chalmers J. B., and Townsend, R. (2009)

‘The effect of training in social perspective-taking on socially maladjusted girls’

Key findings

-Suggested readiness of government agencies by highlighting lapses in building modern infrastructure and provision of shared applications and upgrading the competitiveness of the UAE in the field of e-Government

Methods

The research formulated a quantitative research survey by developing questions to be presented to 35 high ranking institutions in the United Arab Emirates

Hypothesis

The was a possibility of ministries, public and private sectors to attain five dimensions of service excellence could if readiness of these institutions are measured

Variables

Service excellence and five dimensions of service excellence

Limitation

The research succinctly covers factors such as the infrastructure and regulatory policies that affect the growth of the ICT sector in the UAE but fail to integrate it with outputs of the mentioned sectors in the government

United Kingdom (UK)

Notes

A qualitative survey was done on the 35 different organizations including public and private ones.

Choi (2006)

‘An empirical assessment of an integrated theory of cyber-crime victimization’

Key findings

In general, the findings from this study provide an overall picture of the relationship between computer security, online lifestyle, and individual computer-crime.

Scope

The survey was designed to collect data from a 10-month period where students were asked to recall incidences of cybercrime in the school.

Hypothesis

The main theories included routine activities theory and lifestyle-exposure theory

Variables

The dependent variables are Online Lifestyle and Digital Guardian versus independent variable Crime Victim

Future research The structure of the research questionnaires focused on personal computers or laptops and the suggestion of minimizing cybercrime.

United States of America (USA)

Notes

-The models tested were many hence gave the research a more accurate outcome

Clore, G. L., & Jeffrey, K. M. (2008)

‘Emotional role-playing, attitude change, and attraction

toward a disabled person’

Key findings

-The study analyses key components of eGovernment strategies in developing countries with the case study of Saudi Arabia.

-In so doing the research reviews components of the strategy, which include the strategies to eliminate cyber-crime.

Methods

Regression and factor analysis using SPSS

Hypothesis

Strategic objectives and strategic dimensions were found to be very important for cyber victimization control in developing countries

Variables

Cyber victimization control in developing countries

Limitation

The study failed to consider strategic enablers--- key factors that enable cyber victimization control

United Kingdom (UK)

Notes

The research also provided for a detailed explanation of the several aspects of the current situation of cyber victimization

Computer Security Institute (2012)

‘Computer Crime and Security Survey’

Key findings

Measures the ability of federal government agencies in the UAE in terms of technology, organization, and human resources to use ICT outputs and their ability to transform towards computer crime and security survey

Methods

The research mainly adopted secondary data in the gathering data

Hypothesis

The advancement of the UAE e-commerce depended on frameworks like environment, readiness, and usage

Variables

Market theory and concerned parties

Future research

Future research should make attempts to cover factors like regulatory policies and infrastructure affecting the growth of the ICT sector in the UAE.

United Arab Emirates (UAE)

Notes

Service theory and employee motivation were used in this case.

Eisenberg, N. (2012)

‘Emotion, regulation and moral development’

Key findings

The study presents ways to promote regulation and moral development in the private sector and to make the experience of “Saudi Arabia” a pleasurable one

Method

The research mainly adopted the primary source of data where interviews were used

Hypotheses

Architecture and Applications of Information Technology in Saudi Arabia

Variables

Regulation and moral development in Saudi Arabia

Future research

There is a need for research that will connect with this in terms of developing employees’ abilities and emphasize their role in the future of the UAE cyber-crime related activities

United Kingdom (UK)

Notes

It was comparative research that used interviews on workers in non-governmental and governmental organizations.

Fienberg S, and Kadane (2009)

‘The presentation of Bayesian Statistical Analyses in Legal Proceedings’

Key findings

The Bayesian methods of statistics by Pearson took a center stage in government statistics presentation by 1950’s replacing the old method of descriptive

Scope

The study uses literature review methods whereby secondary data was used to discuss outcomes on the government statistical presentation

Qualitative data was collected to support SERVQUAL data

Hypothesis

The theories here included the confidentiality and risk Utility trade-off

There is a possibility of measuring levels of service delivery by adopting SPPS instruments

Variables

-The variables here are neo-Bayesian methods versus Bayesian methods of statistical presentation of data in government set up

-Service excellence and five dimensions of service excellence instrument

Limitations

There is a shortage of credible research data in the field of quality and excellence in the region.

United Kingdom (UK)

Notes

Survey method was appropriate and used in collecting data for determining the customer perception on service quality

Flewitt R. (2012)

‘Conducting research with young children’

Key findings

Crucial steps of service quality and how it relates to customer’s satisfaction was clearly outlined by the study

Method

The research mainly adopted secondary data in the gathering data

Hypothesis

Digital cops in a networked environment concept

Variables

Service quality and customer’s satisfaction

Future research

Since organizations still find it hard to access industry-specific data/ benchmarks to compare their performance and share best practices, future studies should show how business environments need to open up to share good practices within peer industries.

United Kingdom (UK)

The data as analyzed may not be able to provide the needed results since the authors in the journals cited some limitations too.

Flewitt (2005)

‘Cyber-crime mitigations in Saudi Arabia and Perspectives’

Key findings

Different age categories of the adoption of innovation and tendency to victimize online users

Method

The research mainly adopted the primary source of data where interviews were used.

Hypothesis

There is a need to assess the age likely to participate in e-commerce thus subsequently addressing the issue to excellent service delivery

Variables

Age categories of the adoption of innovation

Limitation

In an attempt to assess age factor the research did not do hierarchical separation between women and men embedded in both social institution and social practices

United Kingdom (UK)

A qualitative survey was done on the 20 organizations with such organizations picked randomly from all the emirates.

Hawke, J. L. et al, (2013)

‘Genetic influences on crime difficulties in boys’ and girls’

Key findings

-Crime and psychology are related activities

-This research finds that

the full potential of electronic government services is unlikely to be realized without substantial citizen adoption of such services and their participation in such initiatives.

Method

Regression and factor analysis using SPSS

Theories

Gardner ‘s Multiple Intelligence theory and spearman two-factor theory

Variables

Crime and digital content

Limitations

To concentrated and evaluate the psychological impact on crime and relate it with technology

United Kingdom (UK)

This research adopted a descriptive methodology in comparing the tenet of the hypothesis to be tested.

Heath N, (2009)

‘Europe to get a cybercrime alert system’

Key findings

This research establishes mechanisms that developed countries should use to enhance security from cybercrime activities

Methods

Literature review and evaluating data. Also using court cases as a guiding factor

Hypothesis

The theories incorporated in this case include the review of Space Transition, the confidentiality and risk Utility trade-off

Variables

Control of cybercrime activities as the dependent variable and getting the cybercrime alert system as the independent variable

Limitation

The research fails to establish how the suggested strategies will incorporate the already existing strategies created

United Kingdom (UK)

-The descriptive research method used was the most appropriate

Inman K, and Rudin N (2009)

‘Principles and practices of criminalistics: the profession of forensic science.’

Key findings

Understand the discrepancies among Forensic Community, Discipline/Field, and Agencies

Methods

Empirical study and Review of kinds of literature that compare government strategies that help fight cybercrimes in the United Kingdom and the United Arabs Emirates

Hypothesis

Ethical Standard in Forensic Science, Ethical Standard in Criminal Justice

Variables

Service quality and customer’s satisfaction

Limitation

-Though the research draws on the framework proposed to provide analysis and raise further

research questions on the developmental impacts of benchmarking e-government

initiatives.

methodologies and their impact on e-government development

United States of America (USA)

This paper explores the

methodologies followed by ten widely cited e-government benchmarking reports

Ipsos MORI (2013)

‘A survey of public attitudes to internet security’

Key findings

-The methodology of developing the strategy and its various components, as well as the working process adopted by the strategy development team

Methods

Application of EFQM excellence model. This is done through self-assessment within Federal governments.

Hypothesis

EFQM approach to the implementation effectiveness varied across levels in an organization

Variables

-Business research and methodology used

-Alignment of key government institutions

Limitation

Though the report utilized seven existing benchmarking criteria for the 11 countries studied

Canada

Excellence implementation and employee perceptions were analyzed using a case study approach

James M, (2008). ‘The Computer Fraud and Abuse Act: A Powerful Weapon vs. Unfair

Competitors and Disgruntled Employees’

Key findings

A possible solution to cybercrime prevention for both private and public users

Methods

Literature review and essays analysis

Hypothesis

- Digital cops in a networked environment concept

-The size of the Federal public sector in UAE has been reduced significantly by privatization policy

-Level of Economic development and e-commerce in Saudi Arabia

Variables

-Trends in telecommunications identity and information technology in the Kingdom of Saudi Arabia databases

- Cybercrimes and cops

Limitations

-Despite that the research

the methodology was based on a combination of qualitative and quantitative measures, the final approach tended to be quantitative.

- Further areas of study should include ways of integrating technology and environment

United Kingdom (UK)

-The descriptive research method used was the most appropriate

-Qualitative and analytical methods

Data collection was from economic data and files

Economic theory was the basis of the study

Journal of Crime, Criminal Law and Criminal Justice Koninklijke, Brill NV (2013)

‘Criminal Law and Criminal Justice Koninklijke’

The findings indicate that cybercrime cases are more likely to be prosecuted and sanctions are imposed in economies that are characterized by a higher degree of cooperation and integration with the West

Methods

-Primary data used was collected through the use of three separate questionnaires tailored to fit the desired outcome.

-Descriptive analysis approach

Hypothesis

The theoretical contribution is the observation that emerging economies international cooperation and integration would help them enhance system capacity and law enforcement performance to deal with cybercrime

Variables

Level of Economic Development and Cybercrime

Limitations

-The issue of political and social inclusiveness of benchmarking is a

challenge interrelated with the design of e-government benchmarking

methodologies but was not considered in the analysis

United Kingdom (UK)

Primary and secondary data was majorly used. Various models e.g. Simons’ control model formed the major sources of study.

Kotadia (2004)

‘Skills not money needed to fight cybercrime’

Managed to describe the different types of cyber Attack in different Countries and it can be used to prevent the increasing cybercrimes

Descriptive analysis approach

What are some of ways and tactics which different countries are using to prevent and control cyber crimes

Prevention measures and degree of effectiveness

To investigate to details how different countries are fighting cyber crimes

China

This paper explores the

methodologies followed by ten widely cited e-government benchmarking reports

               

Kouri (2004)

Cybercrime fighters

Finds strategies different Federations have used to fight cybercrime

Application of EFQM excellence model. This is done through self-assessment within Federal governments.

What are the strategies that the federal government have taken to reduce cases of cybercrime in government institutions

Fighting cybercrime within government institutions as the dependent variable and economic development as the independent variable

This research focusses on only one country thus the conclusion given does not reflect cybercrime activities in other countries

United States of America

 

Leyden (2010)

‘Enforcement is key to fighting cybercrime’

He found that the significant difference between physical-space and cyberspace is that, unlike a physical location, cyberspace is not limited to distance, proximity, and physical separation

Cross-examination and analysis of facts

What are Feds fighting cybercrime techniques

Cyberspace, physical location, and physical space

Lack of theory to back up findings

United Kingdom

The data obtained may not be able to provide the needed results owing to the limited respondents used

Lopez and Rodriguez (2012)

‘The Spanish Model. New Left Review’

Spain model of Cybercrime prevention

Survey research was used to determine the assessment of the citizens on the government. Data were collected using questionnaires

What is the Spain model of cybercrime prevention

Cybercrime, technology and prevention techniques review

Unreliable respondent as the major challenge

Spain

This research adopted a descriptive methodology in comparing the tenet of the hypothesis to be tested.

Magnin (2001)

Council of Europe Convention on cyber-crime

The research discussed and proposes means and ways through which cybercrimes can be prevented by different countries

The researcher uses descriptive and empirical review analysis

What are cybercrimes and its origin

Cybercrime, technology, and prevention

Secondary data used are majorly people opinions which lack scientific backups

United Arabs Emirates

The models tested were many hence gave the research a more accurate outcome

Markovits and Westermann (2012)

‘United Kingdom Strategy and Cybercrime’

Forensic Community, Discipline/Field, and Agencies

Regression and factor analysis Using SPSS

Forensic Science, Ethical Standard in the United Kingdom

United Kingdom Strategy and Cybercrime: Hegemonic Power and Economic Gain

Further areas of study should include ways of integrating technology and environment

United Kingdom

The data obtained may not be able to provide the needed results

Mills (2008)

‘Cybercrime in an economic downturn’

Gives deep insights of understanding cyber-crimes especially when countries face an economic downturn

The researcher uses descriptive and empirical review analysis

What are the challenges of fighting the cybercrimes and issues involved in an economically difficult environment

Phenomenal, challenges and legal response

Computer logs and data literature analysis not included in the study

United Arabs Emirates

This research adopted a descriptive methodology in comparing the tenet of the hypothesis to be tested.

Newman and Clarke (2010)

Superhighway Robbery: Preventing E-Commerce Crime

The argument here is that situational crime prevention works and is ideally suited to proving the means of developing measures to combat rapidly growing e-commerce crimes

Uses the concepts of crime prevention strategy and analysis

Understanding of Superhighway Robbery and challenges to the prevention of E-Commerce Crime

It identified as intellectual property, intelligence, information systems and services of various kinds (banking, purchasing among others)

The statement of the problem was not all-inclusive as the book concentrated majorly on the E-commerce assuming other sectors

United Kingdom

The data obtained may not be able to provide the needed results

Patnaik (2004)

The vulnerability of children through cybercrimes

This research has focused on two issues. Firstly, it establishes the vulnerability of children through cybercrimes. Secondly, it links the findings with the American Society of Criminology

Empirical study and Review

What are the effects of school children as a result of cybercrime activities? Does the American Society of Criminology have conforming strategies to fight the crime?

The vulnerability of children as the dependent variable and Strategies used by the American Society of Criminology as the independent variable

This research has failed to establish theories related to the development of children and as a result, it is difficult to relate cybercrime activities as an effect of the development of children

United States of America

The models tested were many hence gave the research a more accurate outcome

Populi (2009)

‘Threat of cybercrime continues to increase’

That forensic science should go beyond the law and should include major factors in crime prevention and establishment of regulations

Interviewing, data collection and analysis using Statistical Programme for Social Science (SPSS)

What is the role of forensic study and science in crime prevention

Come up with implementation strategy and the role of forensic science

The areas of further study includes the procedure of rules implementation and procedures

United Kingdom

This research adopted a descriptive methodology in comparing the tenet of the hypothesis to be tested.

Ryan and Shpantzer (2005)

Legal Aspects of Digital Forensics

Interpretation of digital research ethics and legal issues surroundings it

Reviewing of related literature and comparative analyses of the data from government websites

Ethical theories and research issues

Representative, transformative technologies, Primary mode of digital information, Examples of potential issues implicate

Establishment of research form methodology approach on ethical issues on digital research

United States of America

The models tested were many hence gave the research a more accurate outcome

               

Rosenmann and Safi (2013)

‘Pushed Factors of Internet Crime’

The finding is that it is difficult to identify what works and what does not work in general, or what is even counter-productive

A conceptual Discussion and Literature Review

The concept of Radicalization

Radicalization, De-radicalization, Counter-radicalization

It has also prevented analysis of phenomena on the macro-level of how CT and other policies of Western democracies are perceived in the Arab and Muslim world

Netherlands

The data obtained may not be able to provide the needed results

Sales and Folkman (2010)

‘Ethics in research with human participants’

The findings were that Digital curriculum to be introduced in the study for ethical and professional purposes

An empirical analysis of ethical consideration of digital research

Ethical considerations and issues on digital content and ICT used in the public and private sector

Ethical issues versus legal issues and professionalism

To come up and establish a uniform set of professional norms for the responsible conduct of Internet-based research

United States of America

The data obtained may not be able to provide the needed results

Soumyo (2012)

‘Developing Policies for Cybercrime’

The research has laid out suggestions on how to develop Policies for Cybercrime

Empirical Issues analyzed within the realm of European ethical consideration

Challenges of fighting the cybercrimes and issues involved in an economic difficult environment

The dependent variable as established by the research is Developing Policies for Cybercrime while independent variable being Empirical Issues with cybercrimes

The research has not established contributions made as far as the review of other literature materials is concerned. This further raises the question of the theoretical framework adopted

United Arabs Emirates

This research adopted a descriptive methodology in comparing the tenet of the hypothesis to be tested.

Tapscott (2008)

‘The Rise of the Net Generation’

This research has established concerns in the growing up of digital and how that help speed up cases of cybercrime activities especially in the wake of the rise of the Net Generation

Empirical Issues analyzed within the realm of European ethical consideration

What are cybercrimes and its origin

The dependent variable as established by the research is growing up of digital independent variable being cases of cybercrime activities especially in the wake of the rise of the Net Generation

Further areas of study should include ways of integrating technology and environment

United States of America

The models tested were many hence gave the research a more accurate outcome

 

United Nations Resolution (2005)

‘In determining the strength of new legislation’

The resolution of the meeting was the harmonization of rules and regulation concerning cybercrime prevention

Discussion and presentation method of situational analysis

What is an efficient tool to fight cybercrime?

Cybercrime and law of fighting it

The discussion majorly consist of expert opinions but lacked both practical and empirical evidence of cybercrime

Australia

The data obtained may not be able to provide the needed results

Wall (2013)

‘Digital realism and the governance of spam as cybercrime’

Technology alone has failed to cub cyber crime hence other methodology should be employed to cub it

The study uses empirical literature review

The research question is should law and cyber-crime prevention policy be embedded within the code that structures the architecture of communications?

Law, technology, and level of cybercrime control. Law and spam distribution

To come up with ways through which law and technology can be integrated to avoid cybercrime

United Kingdom

The research also provided for a detailed explanation of the several aspects of the current situation of cyber victimization

Wilkins (2009)

‘Long-Distance Conversations by Computer’

The study revealed that social engineers use statements in positive and negative manners in combination with authoritative and urgent persuasions to influence innocent people on their decisions to respond

The sampling research method was used whereby 200 phishing and advance-fee e-mails were used

What are the persuasion techniques exploited by social engineers for their illegal gains

Triggers and the number of persuasions used

Areas of further research included how education can be used to eliminate online research

United Kingdom

The research also provided for a detailed explanation of the several aspects of the current situation of cyber victimization

Willard, N. E. (2006)

‘Cyber-bullying and cyber threats’

Key findings

-It also found that there are fragmented delivery models that exist in Saudis public and private that are actually causing redundancy across departments

Methods

The researcher adopted online interviews that were sent to 56 different organizations

Hypothesis

-Less coordinated administration in public and private organizations may lead to the dissatisfaction of the customer

Variables

Effectiveness of the software breakthrough for business-to-business commerce

Limitation

The study population was limited to smaller region within one of the emirates hence risky

United Kingdom (UK)

The models tested were many hence gave the research a more accurate outcome

Williams, K. R., & Guerra, N. G. (2007)

Prevalence and predictors of internet bullying

Key findings

It analyzed and brought recommendations regarding ethical issues to be considered when doing online shopping and e-commerce

Scope

The scope of the study encompassed 12 ways of enhancing strategic performance in the public and private sectors vis-à-vis private.

Theories

The main theories were lifestyle-exposure theory

Variables

Strategic priorities for information technology programs as a benchmark on quality

Limitation

The study population was limited to smaller region within one of the emirates hence risky

United Arab Emirates (UAE)

The data obtained may not be able to provide the needed results

Wolak, J., Mitchell, K. J., & Finkelhor, D. (2006)

‘Online Victimization: 5 Years Later’ 

Key findings

Taking a wide approach to service delivery by building a new cross-department organization with accountability and governance for service delivery.

Method

The research adopted the model of testing and verifying a significant number of hypotheses and models as part of the methodology in the study.

Hypothesis

The first hypothesis was; ways to take more of an enterprise-wide approach to service delivery

Variables

Total expenditure in terms of millions by UAE and the outcome of strategies the spent millions leverage on.

Limitation

The study population was limited to smaller regions within one of the emirates hence risky.

United Arab Emirates (UAE)

The data obtained may not be able to provide the needed results

Ybarra, M. L., & Mitchell, K. J. (2004)

‘Online aggressor/targets, aggressors, and targets’

Key findings

Establishes the computer usage approach by establishing service standards for interactions with all different categories of customers

Method

The was the application of primary that was gathered through interviews and questionnaire

Hypothesis

Telecommunications and Information Technology in the Kingdom of Saudi Arabia databases

Variables

Future of Telecommunications Identity and Information Technology in the Kingdom of Saudi Arabia databases

Future research

While the scope of the study seemed feasible, there is a need to evaluate the feasibility of a one-stop-shop approach with other departments where there is a common customer base.

United Arab Emirates (UAE)

This research adopted a descriptive methodology in comparing the tenet of the hypothesis to be tested.

...Download file to see next pages Read More
Download file to see previous pages

Heath N, (2009) ‘Europe to get cybercrime alert system’ Key findings This research establishes mechanisms that developed countries should use to enhance security from cybercrime activities Methods Literature review and evaluating data. Also using court cases as a guiding factor Hypothesis The theories incorporated in this case include the review of Space Transition, the confidentiality and risk Utility trade off Variables Control of cybercrime activities as the dependent variable and getting cybercrime alert system as the independent variable Limitation The research fails to establish how the suggested strategies will incorporate the already existing strategies created United Kingdom (UK) -Descriptive Research method used was the most appropriate Inman K, and Rudin N (2009) ‘Principles and practices of criminalistics: the profession of forensic science.

’ Key findings Understand the discrepancies among Forensic Community, Discipline/Field, and Agencies Methods Empirical study and Review of literatures that compare government strategies that help fight cybercrimes in United Kingdom and United Arabs Emirates Hypothesis Ethical Standard in Forensic Science, Ethical Standard in Criminal Justice Variables Service quality and customer’s satisfaction Limitation -Though the research draws on the framework proposed to provide analysis and raise further research questions on the developmental impacts of benchmarking e-government initiatives.

methodologies and their impact on e-government development United States of America (USA) This paper explores the methodologies followed by ten widely cited e-government benchmarking reports Ipsos MORI (2013) ‘A survey of public attitudes to internet security’ Key findings -The methodology of developing the strategy and its various components, as well as the working process adopted by the strategy development team Methods Application of EFQM excellence model. This is done through self-assessment within Federal governments.

Hypothesis EFQM approach to the implementation effectiveness varied across levels in an organization Variables -Business research and methodology used -Alignment of key government institutions Limitation Though the report utilized seven existing benchmarking criteria for the 11 countries studied Canada Excellence implementation and employee perceptions was analyzed using case study approach James M, (2008). ‘The Computer Fraud and Abuse Act: A Powerful Weapon vs. Unfair Competitors and Disgruntled Employees’ Key findings Possible solution on cybercrime prevention for both private and public users Methods Literature review and essays analysis Hypothesis - Digital cops in a networked environment concept -The size of Federal public sector in UAE has been reduced significantly by privatization policy -Level of Economic development and e-commerce in Saudi Arabia Variables -Trends in telecommunications identity and information technology in Kingdom of Saudi Arabia databases - Cybercrimes and cops Limitations -Despite that the research methodology was based on a combination of qualitative and quantitative measures, the final approach tended to be quantitative.

- Further areas of study should include ways of integrating technology and environment United Kingdom (UK) -Descriptive Research method used was the most appropriate -Qualitative and analytical methods Data collection was from economic data and files Economic theory was the basis of the study Journal of Crime, Criminal Law and Criminal Justice Koninklijke, Brill NV (2013) ‘Criminal Law and Criminal Justice Koninklijke’ The findings indicate that cybercrime cases are more likely to be prosecuted and sanctions are imposed in economies that are characterized by a higher degree of cooperation and integration with the West Methods -Primary data used was collected through the use of three separate questionnaires tailored to fit the desired outcome.

-Descriptive analysis approach Hypothesis Theoretical contribution is the observation that emerging economies international cooperation and integration would help them enhance system capacity and law enforcement performance to deal with cybercrime Variables Level of Economic development and Cyber crime Limitations -The issue of political and social inclusiveness of benchmarking is a challenge interrelated with design of e-government benchmarking methodologies but was not considered in the analysis United Kingdom (UK) Primary and secondary data was majorly used.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Synthesis of Systematic Analysis Results Assignment, n.d.)
Synthesis of Systematic Analysis Results Assignment. https://studentshare.org/social-science/2052272-table-reference
(Synthesis of Systematic Analysis Results Assignment)
Synthesis of Systematic Analysis Results Assignment. https://studentshare.org/social-science/2052272-table-reference.
“Synthesis of Systematic Analysis Results Assignment”. https://studentshare.org/social-science/2052272-table-reference.
  • Cited: 0 times

CHECK THESE SAMPLES OF Synthesis of Systematic Analysis Results

Meta Analysis Reconciling the Results of Independent Studies

The following research paper "Meta-Analysis Reconciling the results of Independent Studies" is focused on the meta-analysis, a research method used in statistics, which combines the results of different studies.... Single research on education can yield a range of different results due to a number of factors.... Different research methods, the setting of the research and research instruments influence the nature of results (Allen, Bourhis, Burrell & Mabry, 2010)....
6 Pages (1500 words) Research Paper

A New Method for the Preparation of an Intermediate for the Synthesis of Mycolic Acids

This dissertation "A New Method for the Preparation of an Intermediate for the synthesis of Mycolic Acids" shows that the main aims of the study are to prepare a pure sample of a key intermediate in the synthesis of methoxy- and keto-mycolic acids which are present in M.... From the old synthesis of mycolic acids, three structural mycolic acid classes are found in the M.... In the old method of analysis and preparation, the mycolic acids were characterized by hydrophobic C34 to C 65acids with side chains of carbon atoms ranging from C22 to C24 are?...
21 Pages (5250 words) Dissertation

Topic CRITICAL REFLECTION AND DECISIONMAKING REPORT RELATED TO THE UTILISATION OF EVIDENCE

In this assignment, I will present my critical thinking and reflective practice on the issue of use of restraint on patients, which I encountered in my practice based on analysis of evidence as indicated in literature and as summarised in Joanna Briggs Evidence Based Practice Information Sheet for Health Professionals Part I for use in acute and residential care facilities in the following format....
5 Pages (1250 words) Essay

Systematic review and metaanalysis

Systematic reviews and meta-analysis involve search strategies, comprehensive and detailed plans, with the primary aim of reducing bias through identifying, appraising, and synthesizing all relevant studies on a given topic.... Uman (2011) strives to describe a distinction between....
15 Pages (3750 words) Thesis

How Designers See and How They Critically Think

This paper "How Designers See and How They Critically Think" discusses design thinking is more than a skill to be, but rather it is a way of thinking that can enhance the nature of schooling.... Improving the design thinking of students by having them use methods and processes.... ... ... ... The design thinking competency model is necessary for diagnostic and assessment purposes....
8 Pages (2000 words) Case Study

Strategic Management - Business Strategy for Sustainable Development

When it comes to the creation of a strategic environmental analysis system, it is necessary to understand the five phases of the SEAN process including preparation, scoping, detailed studies, planning, and follow-up and monitoring.... This could be attained through the implementation of a strategic environmental analysis system.... This paper will discuss what a strategic environmental analysis system is and the essential analysis frameworks in the external and organisational environments....
7 Pages (1750 words) Case Study

Systematic Reviews and Clinical Practice Guidelines

Statistical methods (Meta-analysis) may or may not be used to analyze and summarize the results of the included studies.... It is the end result of combining the statistical results of multiple studies in order to get a weighted average effect of the intervention under consideration.... From the discussion it is clear that Meta-analysis is the quantitative section of a systematic review.... As the essay highlights a well-conducted systematic review and Meta-analysis can help us keep up-to-date....
8 Pages (2000 words) Essay

The Structural Features and Characteristics of Birnessite Family of Minerals

The formation of Birnessite results from the precipitation process in oceans, lakes, and groundwater.... As the paper "The Structural Features and Characteristics of Birnessite Family of Minerals" outlines, birnessite represented by the chemical formula Na0.... Ca0.... K0.... )(Mn4+, Mn3+)2O4 · 1....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us