Business Research Methods: Understanding The Planning Process, Professional Ethics, And Methodologies

Demonstrate an understanding of the research planning process and business research methods

Here, I am going to talk about my learning and my learning experiences from the business researches (advantages and disadvantages of business outsourcing function and challenges in cyber security for business) done. In this assignment, I talk about the effectiveness and usefulness of my learning experience. Further, I evaluate my learning and learning process and explain a plan that I will apply in the future for the development of career and professional life.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

My opinion about the learning experience gathered fromassignment 1, is outsourcing has become a contemporary buzzword of the present day, as most of the quality-concerned business organisations are outsourcing their non-core businesses. The main factor influence organisation to outsource their operations is save cost and higher expenses. However, the benefits differ from one organisation to another. The shifting of organisational also shifts power, which is one of the negative aspects of outsourcing. My opinion about the learning experience gained from assignment 2 is, with rapid technological development, business organisations have become more inclined toward running their business digitally. Dunn Cavelty (2013) stated that it increases the threat of cyber insecurity if appropriate policies and procedures regarding cyber security are not implemented at the primary phase. Von Solms and Van Niekerk(2013) has pointed out some important challenges of cyber security, including, hacking, hacktivism, ransomware those affect the day-to-day operations carried out by companies and create legal issues for them.

The experiences I have gathered from both the business researches are extremely valuable or me, as it helped to explore my knowledge pertaining to two latest and important topics of present day business. While doing my own business, I can apply my experience in making important and error free business decisions. I will consider the drawbacks of outsourcing before taking any related decision. Moreover, the challenges associated with cybersecurity will guide me in placing all the necessary procedures and policies related to cyber security when I will explore my career as a business person.

From the first assignment, I have learned the advantages and disadvantages of outsourcing. Further, I have learned about the process of writing a literature review. The second assignment not only enriched my knowledge with the challenges related to cybersecurity and the way they can be addressed, but it also gave me knowledge regarding carrying put a research, selecting sample size and choosing an appropriatedata collection method. All these learning processes will help me in my future courses, where I may have to carry out a research.

Besides, the knowledge and experience about cyber security and outsourcing will give me significant advantages in my future career. I can use my learning experience and processes in running my business competently. As stated by Moet al. (2012), in order to run a business that is secured from cyber threats, there must be both technically and corporeal security policies within the organisation. Therefore, to avoid the challenges of incorporating security methods after being attacked, it will be necessary for meto employ the security system while developing operations of the online business. Not only in business life, but I can use the learning process in personal life too. I can protect my personal accounts on social networking sites by applying my learning process.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Understand the importance of professional ethics and how to recognize and address ethical issues in a business research project

Holweg and Pil (2012) stated that, sometimes, the outsourcing partner may disclose confidential information regarding the firm for earning the higher profit that can be harmful to the firm, which is involved in outsourcing its business operations. Therefore, when I will start my career, I should remember this challenge before engaging in outsourcing and I will make a legal contract with my outsourcing partner that it cannot reveal any confidential information about my company, as it will be unethical.

In the two assignments, I carried out extensive researches regarding the advantages and disadvantages of outsourcing andthreats in cyber security in business. I have done literature reviews on both the topics. I have critically analysed the different aspects related to outsourcing and cyber security. I gathered information regarding the benefits and challenges of outsourcing and threats of cyber security in business from previously published different books, journals and from websites.

I read journals and business articles on outsourcing, where I have seen that a number of scholars are talking about the benefits of outsourcing, where some of them are against this practice. For example, according to Willcocksand Cullen(2013), outsourcing helps business companies to obtain skilled labours to perform their business activities at a cheaper rate. On the other hand, Lacity and Willcocks (2013) argued that outsourcing may create unhealthy relationships, inferior use of modern technology and skills and talent of the employees.

During my learning session, I have heard about the challenges related cyber security and its impact on business from my professors. They have said that a huge number of devices are connected with the computer, due to ransomware and activism, there is a huge possibility of hacking of these devices. On the other hand,Wu and Irwin (2016) commented that with technological advancement, it has become easier or businesses to grasp the opportunity of direct integration of somatic lives and computer related systems.

The business researches, I have conducted have helped me to learn the way of writing a literature review. I came to know about the way searching information regarding a research topic from various sources of information. Applying the knowledge, I collected information on the two concerned research topics, challenges in cyber security and benefits and challenges associated with outsourcing. Discussing the topic from the viewpoints of different scholars and authors have provided me with a greater knowledge and learning on the two concerned research topics.

Further, I have learned about the way of carrying out a primary research. First, I need to select the process of data collection, sampling techniques and other important tools related to research. Then I need to select the sample size using the sampling technique. Further, a questionnaire needs to be developed that are to be answered by the selected sample size. For example, while carrying out the research on the challenges of cyber security I used convenient sampling method and selected a group of people for discussion with a questionnaire contains 15 to 20 questions.

From both business types of research, I have learned a significant number of things, which are important to run a business successfully in the present competitive business environment. I have learned the importance of taking applying measures for averting challenges related to cyber security and the challenges related to outsourcing those must be considered before outsourcing business operations.

Evaluate the impact of existing business research in a business environment

I particularly carried outresearches on the challenges and advantages of outsourcing and the threats associated with cyber security in business, as these two are the mostdiscussed topics of contemporary business.

Technological development has provided significant opportunities and advantages to business organisations in targeting customers, understanding their needs, expanding businesses, promoting products and services in national and international markets and so on. Besides the advantages, it possesses some significant threats for the business (Chenet al. 2012). Therefore, understanding the ways of avoiding these threats is crucial for the business organisations and me, as I want to pursue my career in business. Moreover, I have understood the benefits of outsourcing along with its disadvantages. Hence, I carried out a literature review in assignment 1 for analysing the advantages and disadvantages of outsourcing. Similarly, in assignment 2, I have done a literature review of risks related to cyber security. Here, I have also raised researchquestion, toward which the research activities to be done. Further, I selected tools and techniques required for carrying out the research appropriately and achieving the research objectives. Further, a time schedule for carrying out the research objectives in a sequential manner is also developed.

I feel that, for running a business successfully, it is crucial to take appropriate measures and initiatives. Massini and Miozzo(2012) commentedthat the marketers need to apply a proactive approach for anticipating the potential risks and threats that may come from outsourcing or due to lack of measures taken for cyber security.It is connected with the learning related to maintaining operational efficiency and earning customer satisfaction.Shantz and Tomblin(2014) stated thatcyber security policies help to protect customer data, financial transaction and their personal information from being hacked. Hence, it will make customers feel safe while dealing with the organisation.

If I fail to incorporate appropriate cyber security measures in my business, then it may bring significant harm to my business and my career.

I will apply my learning to my future profession (a businessperson). While carrying out outsourcing, I will utilise the following steps:

  • First, I will make a plan of operations to be outsourced and the required skills and qualifications to complete them.
  • The second step is choosing  suitable outsourcing partners, who fulfill the required criteria (contractors’ experience, occupational health and safety policies, regular supervision) (Dinu, 2015)
  • In the next stage a meeting for discussing the expectations from the partner needs to be held (Oshriet al.2015)
  • I will supervise whether the operations are being done as per the agreement and maintaining quality standard
  • Finally, I will hire an auditor to examine whether the works are completed appropriately

For maintaining cyber security, I will apply the following processes:

  • Change default account names and passwords while installing computer systems
  • Update the computer operating system
  • Using encryption software for securing customer related information from being theft while transaction
  • Using of sensitive information will be limited to specific people

Conclusion

Both the business researches have explored my knowledge regarding the opportunities and threats of carrying out online business and outsourcing. I can use the knowledge for my career development in the future.

References

Chen, H., Chiang, R.H. and Storey, V.C., 2012. Business intelligence and analytics: From big data to the big impact.MIS quarterly, 36(4), pp.1165-1188.

Dinu, A.M., 2015. The risks and benefits of outsourcing. Knowledge Horizons.Economics, 7(2), p.103.

Dunn Cavelty, M., 2013. From Cyber?Bombs to Political Fallout: Threat Representations with an Impact in the Cyber?Security Discourse. International Studies Review, 15(1), pp.105-122.

Holweg, M. and Pil, F.K., 2012. Outsourcing complex business processes. California Management Review, 54(3), pp.98-115.

Lacity, M.C. and Willcocks, L.P., 2013. Outsourcing business processes for innovation. MIT Sloan management review, 54(3), p.63.

Massini, S. and Miozzo, M., 2012.Outsourcing and offshoring of business services: challenges to theory, management and geography of innovation.Regional Studies, 46(9), pp.1219-1242.

Mo, Y., Kim, T.H.J., Brancik, K., Dickinson, D., Lee, H., Perrig, A. and Sinopoli, B., 2012. Cyber–physical security of a smart grid infrastructure.Proceedings of the IEEE, 100(1), pp.195-209.

Oshri, I., Kotlarsky, J. and Willcocks, L.P., 2015. The Handbook of Global Outsourcing and Offshoring 3rd edition.Springer.

Shantz, J. and Tomblin, J., 2014. Cyber Disobedience: Re. Presenting Online Anarchy.

Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security. Computers & Security, 38, pp.97-102.

Willcocks, L. and Cullen, S., 2013. Intelligent IT outsourcing.Routledge.

Wu, C.H.J. and Irwin, J.D., 2016. Introduction to computer networks and cybersecurity. CRC Press