0% found this document useful (0 votes)
33 views82 pages

Higher Nationals

The document outlines the internal verification process for assessment decisions in the BTEC Higher National Diploma in Computing, specifically for Unit 16: Computing Research Project. It includes guidelines for assignment submission, assessment criteria, and the importance of adhering to academic integrity and referencing standards. Additionally, it provides a framework for students to develop a research proposal on Big Data, detailing required components and resources for successful completion.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views82 pages

Higher Nationals

The document outlines the internal verification process for assessment decisions in the BTEC Higher National Diploma in Computing, specifically for Unit 16: Computing Research Project. It includes guidelines for assignment submission, assessment criteria, and the importance of adhering to academic integrity and referencing standards. Additionally, it provides a framework for students to develop a research proposal on Big Data, detailing required components and resources for successful completion.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 82

1

Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC Higher National Diploma in Computing

Assessor Internal Verifier


Unit 16: Computing Research Project (Pearson Set)
Unit(s)
Research Proposal – Big Data
Assignment title
Praveen Maheesha
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST


Do the assessment criteria awarded match
those shown in the assignment brief? Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
Y/N
• Constructive?
• Linked to relevant assessment Y/N
criteria?

• Identifying opportunities for Y/N


improved performance?
Y/N
• Agreeing actions?
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if
Date
required)
2

Confirm action completed


Remedial action taken

Give details:

Assessor signature Date

Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
3

Higher Nationals - Summative Assignment Feedback Form

Student Name/ID Praveen Maheesha – KAN00175122


Unit Title Unit 16: Computing Research Project (Pearson Set)

Assignment Number Assessor


Date Received 1st
Submission Date
submission
Date Received 2nd
Re-submission Date
submission
Assessor Feedback:

LO1 Examine appropriate research methodologies and approaches as part of the research process

Pass, Merit & Distinction


P1 P2 M1 D1
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:


* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
4
5

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature
[email protected]
Student Date
signature
6

Pearson
Higher Nationals in
Computing
Unit 16: Computing Research Project
(Pearson Set)
Research Project Proposal
7
8

General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your
work.
2. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
8. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will
then be asked to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
9
10

Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct way. I further understand what it means
to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of the Pearson UK.
3. I know what the consequences will be if I plagiaries or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspects of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the attached.

Student’s Signature: Date:


([email protected]) (Provide Submission Date)
11

Assignment Brief
Student Name /ID Number Praveen Maheesha – KAN00175122

Unit Number and Title Unit 16: Computing Research Project (Pearson Set)

Academic Year

Unit Tutor

Assignment Title Final Research Project Proposal -Big Data

Issue Date

Submission Date

IV Name & Date

Submission Format:
Research Project Proposal
 The submission is in the form of an individual written report.
 This should be written in a concise, formal business style using single spacing and font size 12.
 You are required to make use of headings, paragraphs and subsections as appropriate, and all
work must be supported with research.
 Reference using the Harvard referencing system.
 Please provide a referencing list using the Harvard referencing system.
 The recommended word limit is minimum 2000 words.

Unit Learning Outcomes:


LO1. Examine appropriate research methodologies and approaches as part of the research process .

Assignment Brief and Guidance:


Big Data
Big data is a term that has become more and more common over the last decade. It was originally
12

defined as data that is generated in incredibly large volumes, such as internet search queries,
data from weather sensors or information posted on social media. Today big data has also come
to represent large amounts of information generated from multiple sources that cannot be
processed in a conventional way and that cannot be processed by humans without some form of
computational intervention.
Big data can be stored in several ways: Structured, whereby the data is organised into some form
of relational format, unstructured, where data is held as raw, unorganised data prior to turning
into a structured form, or semi-structured where the data will have some key definitions or
structural form but is still held in a format that does not conform to standard data storage
models.

Many systems and organisations now generate massive quantities of big data on a daily basis,
with some of this data being made publicly available to other systems for analysis and processing.
The generation of such large amounts of data has necessitated the development of machine
learning systems that can sift through the data to rapidly identify patterns, to answer questions or
to solve problems. As these new systems continue to be developed and refined, a new discipline
of data science analytics has evolved to help design, build and test these new machine learning
and artificial intelligence systems.

Utilising Big Data requires a range of knowledge and skills across a broad spectrum of areas and
consequently opens opportunities to organisations that were not previously accessible. The
ability to store and process large quantities of data from multiple sources has meant that
organisations and businesses are able to get a larger overall picture of the pattern of global trends
in the data to allow them to make more accurate and up to date decisions. Such data can be used
to identify potential business risks earlier and to make sure that costs are minimised without
compromising on innovation.

However, the rapid application and use of Big Data has raised several concerns. The storage of
13

such large amounts of data means that security concerns need to be addressed in case the data is
compromised or altered in such a way to make the interpretation erroneous. In addition, the
ethical issues of the storage of personal data from multiple sources have yet to be addressed, as
well as any sustainability concerns in the energy requirements of large data warehouses and
lakes.

The theme will enable students to explore some of the topics concerned with Big Data from the
standpoint of a prospective computing professional or data scientist. It will provide the
opportunity for students to investigate the applications, benefits and limitations of Big Data while
exploring the responsibilities and solutions to the problems it is being used to solve.
Choosing a research objective/question
Students are to choose their own research topic for this unit. Strong research projects are those
with clear, well focused and defined objectives. A central skill in selecting a research objective is
the ability to select a suitable and focused research objective. One of the best ways to do this is to
put it in the form of a question. Students should be encouraged by tutors to discuss a variety of
topics related to the theme to generate ideas for a good research objective.

The range of topics discussed on Big Data, could cover the following areas:
 Storage models
 Cyber security risks
 Future developments and driving innovation.
 Legal and ethical trade-offs

Project Proposal should cover following areas.


1. Definition of research problem or question. (This can be stated as a research question,
objectives, or hypothesis)
2. Provide a literature review giving the background and conceptualisation of the proposed area
14

of study. (This would provide existing knowledge and benchmarks by which the data can be
judged)
3. Examine and critically evaluate research methodologies and research processes available.
Select the most suitable methodologies and the process and justify your choice based on
theoretical/philosophical frameworks. Demonstrate understanding of the pitfalls and
limitations of the methods chosen and ethical issues that might arise.
4. Draw points (1–3, above) together into a research proposal by getting agreement with your
tutor.
15

Useful links
Useful resources for underlying principles, examples of articles and webinars on the theme:

Resourc
e Type of
Resource Titles Links
Resource
Number

1 Article 6V’s of Big Data https://www.geeksforgeeks.org/5vs-of-big-data/

2 Article Business Ethics and Big Data https://www.ibe.org.uk/resource/business-ethics-and-big-data.html

3 Article What is Big Data Security? Challenges & Solutions https://www.datamation.com/bigdata/big-data-security/

4 Article What is Big Data? https://www.oracle.com/uk/bigdata/what-is-big-data/


5 Magazine Information Sciences https://www.sciencedirect.com/jou rnal/information-sciences
6 Magazine Big Data Research https://www.sciencedirect.com/jou rnal/big-data-research
Big Data & Investment Management:
7 Report https://tinyurl.com/yff4uenz
The Potential to Quantify Traditionally Qualitative factors

8 Webinar Big Data Sources & Analysis Webinar https://tinyurl.com/2p85d7mb


Big Data In 5 Minutes | What Is Big Data?| Introduction To
9 Video https://www.youtube.com/watch?v =bAyrObl7TYE
Big Data |Big Data Explained

10 Video Challenges of Securing Big Data https://www.youtube.com/watch?v =3xIuIcPzMVs


11 Video The Importance of Data Ethics https://www.youtube.com/watch?v =gLHMhCtxEYE
12 Book A Bite-Sized Guide to Visualising Data https://tinyurl.com/38d6thsk
13 Book Business Intelligence Strategy and Big Data Analytics https://www.sciencedirect.com/bo ok/9780128091982/businessintelligence-

Page 15 of 82 Praveen – KAN00175122 CRP Assignment.


16

Resourc
e Type of
Resource Titles Links
Resource
Number
strategy-and-big-data-analytics

https://www.sciencedirect.com/book/9780128156094/principles-and-
14 Book Principles and Practice of Big
practice-of-big-data

Systems Simulation and


15 Book https://tinyurl.com/2s3wkehn
Modelling for Cloud Computing and Big Data Applications
Big Data in Construction: Current Applications and Future
16 Journal https://www.mdpi.com/25042289/6/1/18
Opportunities

Big Data with Cloud Computing: Discussions and


17 Journal https://www.sciopen.com/article/pdf/10.26599/BDMA.2021.9020016.pdf
Challenges

18 Journal Mobile Big Data Solutions for a better Future https://tinyurl.com/hpk2zvvw


The social implications, risks, challenges and opportunities https://tinyurl.com/yw593svk
19 Journal
of big data

Policy discussion – Challenges of big data and analytics


20 Journal https://tinyurl.com/kyb3j6x7
driven demand-side management

Explore Big Data Analytics Applications and Opportunities:


21 Journal https://tinyurl.com/597j8nd3
A Review
https://www.oracle.com/cl/a/ocom/ docs/what-is-big-data-ebook-
22 Journal What is Big Data?
4421383.pdf

Towards felicitous decision making: An overview on


23 Journal https://www.sciencedirect.com/science/article/abs/pii/S002002551630 4868
challenges and trends of Big Data

Page 16 of 82 Praveen – KAN00175122 CRP Assignment.


17

Resourc
e Type of
Resource Titles Links
Resource
Number
Critical analysis of Big Data challenges and analytical
24 Journal https://www.sciencedirect.com/science/article/pii/S014829631630488X
methods
25 Journal Big Data Security Issues and Challenges https://tinyurl.com/wabx7zya
26 Journal IoT Big Data Security and Privacy Versus Innovation https://ieeexplore.ieee.org/abstract /document/8643026
27 Journal Big Data Security and Privacy Protection https://www.atlantis-press.com/proceedings/icmcs18/25904185

https://journalofcloudcomputing.springeropen.com/articles/10.1186/
28 Journal Big data analytics in Cloud computing: an overview
s13677-022-00301-w

Page 17 of 82 Praveen – KAN00175122 CRP Assignment.


18

Grading Rubric

Grading Criteria Achieved Feedback

P1 Produce a research proposal that clearly defines a


research question or hypothesis, supported by a literature
review.

P2 Examine appropriate research methods and approaches


to primary and secondary research.

M1 Analyse different research approaches and methodology


and make justifications for the choice of methods selected
based on philosophical/theoretical frameworks.

D1 Critically evaluate research methodologies and processes


in application to a computing research project to justify
chosen research methods and analysis

Page 18 of 82 Praveen – KAN00175122 CRP Assignment.


19

Research Proposal Form


Student Name Praveen Maheesha
Student number KAN001765122 Date

Centre Name
Unit Unit 16: Computing Research Project (Pearson Set)
Tutor Ms. Shyamali
Proposed title

Section One: Title, objective, responsibilities

Title or working title of research project (in the form of a question, objective or hypothesis):
Research project objectives (e.g. what is the question you want to answer? What do you want to
learn how to do? What do you want to find out?): Introduction, Objective, Sub Objective(s),
Research Questions and/or Hypothesis

Section Two: Reasons for choosing this research project


Reasons for choosing the project (e.g. links to other subjects you are studying, personal interest,
future plans, knowledge/skills you want to improve, why the topic is important): Motivation,
Research gap

Page 19 of 82 Praveen – KAN00175122 CRP Assignment.


20

Section Three: Literature sources searched


Use of key literature sources to support your objective, Sub Objective, research question and/or
hypothesis: Can include the Conceptual Framework

Section Four: Activities and timescales


Activities to be carried out during the research project (e.g. research, development, analysis of
ideas, writing, data collection, numerical analysis, tutor meetings, production of final outcome,
evaluation, writing the report) and How long this will take:
Milestone Propose completion date

Section Five: Research approach and methodologies


Type of research approach and methodologies you are likely to use, and reasons for your choice:
What your areas of research will cover: Research Onion; Sample Strategy/Method; Sample Size

Comments and agreement from tutor


Comments (optional):

I confirm that the project is not work which has been or will be submitted for another qualification
and is appropriate.

Agreed Yes No Name Date

Comments and agreement from project proposal checker (if applicable)


Comments (optional):

I confirm that the project is appropriate.

Agreed Yes No Name Date

Page 20 of 82 Praveen – KAN00175122 CRP Assignment.


21

Research Ethics Approval Form


All students conducting research activity that involves human participants or the use of data
collected from human participants are required to gain ethical approval before commencing
their research. Please answer all relevant questions and note that your form may be
returned if incomplete.
Section 1: Basic Details
Project title:
Student name: Praveen Maheesha
Student ID number: KAN00175122
Programme:
School: Esoft Metro Campus Kandy
Intended research start date:
Intended research end date:
Section 2: Project Summary
Please select all research methods that you plan to use as part of your project

 Interviews:
 Questionnaires: ✘

 Observations:
 Use of Personal Records:
 Data Analysis:
 Action Research:
 Focus Groups:
 Other (please specify): ...........................................................
Section 3: Participants
Please answer the following questions, giving full details where necessary.
Will your research involve human participants?

Who are the participants? Tick all that apply:

Age 12-16 Young People aged 17–18 Adults


How will participants be recruited (identified and approached)?

Describe the processes you will use to inform participants about what you are doing:

Page 21 of 82 Praveen – KAN00175122 CRP Assignment.


22

Studies involving questionnaires:

Will participants be given the option of omitting questions they do not wish to answer?

Yes ✘ No
If “NO” please explain why below and ensure that you cover any ethical issues arising from this.

Studies involving observation:

Confirm whether participants will be asked for their informed consent to be observed.

Yes No ✘

Will you debrief participants at the end of their participation (i.e. give them a brief explanation of
the study)?

Yes ✘ No
Will participants be given information about the findings of your study? (This could be a brief
summary of your findings in general)

Yes No ✘

Section 4: Data Storage and Security

Confirm that all personal data will be stored and processed in compliance with the Data
Protection Act (1998)
Yes No
Who will have access to the data and personal information?

During the research:

Where will the data be stored?

Will mobile devices such as USB storage and laptops be used?


Yes No
If “YES”, please provide further details:
After the research:

Where will the data be stored?

How long will the data and records be kept for and in what format?

Page 22 of 82 Praveen – KAN00175122 CRP Assignment.


23

Will data be kept for use by other researchers?


Yes No ✘
If “YES”, please provide further details:

Section 5: Ethical Issues


Are there any particular features of your proposed work which may raise ethical concerns?
If so, please outline how you will deal with these:

Section 6: Declaration
I have read, understood and will abide by the institution’s Research and Ethics Policy:
Yes ✘ No
I have discussed the ethical issues relating to my research with my Unit Tutor:
Yes No
I confirm that to the best of my knowledge:
The above information is correct and that this is a full description of the ethics issues that may
arise in the course of my research.

Name:

Date:

Please submit your completed form to: ESOFT Learning Management System (ELMS)

Page 23 of 82 Praveen – KAN00175122 CRP Assignment.


THE RESEARCH PROPOSAL

Analyzing the impact of Cyber security in Responsible, and


Financial effect of Big Data Analytics
In Commercial Bank of Ceylon.

By

Praveen
KAN00175122

Research Proposal Submitted in accordance with the requirements for the


COMPUTING RESEARCH PROJECT MODULE OF
PEARSON’S HND IN SOFTWARE ENGINEERING
PROGRAMME
at the
ESOFT METRO CAMPUS

Name of research Tutor: Ms. Shyamali.

Page 24 of 82 Praveen – KAN00175122 CRP Assignment.


i

ACKNOWLEDGMENT

Page i of lxxxii Praveen – KAN00175122 CRP Assignment.


ii

EXECUTIVE SUMMARY

The executive summary offers a succinct synopsis of the study, emphasizing its goals, main
conclusions, and ramifications. We analyzed the complicated field of Big Data analytics in
our research in Commercial Bank of Ceylon, focused on cyber security, analyzing the impact
of Cybersecurity in Responsible, and Financial effect of Big Data Analytics in Commercial
Bank of Ceylon assess Cybersecurity risks, analyze responsible and financial effects, and
create suitable techniques for using data. By examining important sources from literature and
research, we found a strong relationship between an organization's capacity to successfully
handle obstacles, Cybersecurity measures, and compliance with responsible as well as
financial standards. The results emphasized how crucial it is to combine ethical standards,
responsible compliance, and to encourage financial data use, incorporate Cybersecurity
resilience into Big Data analytics procedures. Reduce the hazards. Methods for improving the
management of data, openness, and trust in data-driven decision-making processes are
informed by the research, which offers insightful information to researchers, businesses, and
leaders.

Page ii of lxxxii Praveen – KAN00175122 CRP Assignment.


iii

CONTENTS

ACKNOWLEDGMENT................................................................................................................. i
EXECUTIVE SUMMARY..............................................................................................................ii
CONTENTS............................................................................................................................... iii
LIST OF TABLES......................................................................................................................... v
LIST OF FIGURES.......................................................................................................................vi
INTRODUCTION........................................................................................................................ 1
1.1. Introduction............................................................................................................... 1
1.2. Purpose of research....................................................................................................1
1.3. Significance of the Research......................................................................................3
1.4. Research objectives....................................................................................................5
1.5. Research Sub objectives............................................................................................ 5
1.6. Research questions.....................................................................................................5
1.7. Hypothesis................................................................................................................. 6
LITERATURE REVIEW.................................................................................................................8
2.1. Literature Review...................................................................................................... 8
2.2. Conceptual framework.............................................................................................17
METHODOLOGY......................................................................................................................21
3.1. Research philosophy................................................................................................21
3.2. Research approach...................................................................................................26
3.3. Research strategy.....................................................................................................31
3.4. Research Choice...................................................................................................... 35
3.5. Time frame.............................................................................................................. 38
3.6. Data collection procedures.......................................................................................39
3.6.1. Type of Data..................................................................................................... 42
3.6.2. Data Collection Method....................................................................................45
3.6.3. Data Collection and Analyze Tools....................................................................47
3.7. Sampling..................................................................................................................49
3.7.1. Sampling Strategy.............................................................................................51
3.7.2. Sample Size.......................................................................................................53
3.8. The selection of participants....................................................................................55
Gantt chart............................................................................................................................. 58
REFERENCES........................................................................................................................... 59

Page iii of lxxxii Praveen – KAN00175122 CRP Assignment.


iv

Page iv of lxxxii Praveen – KAN00175122 CRP Assignment.


v

LIST OF TABLES

Page v of lxxxii Praveen – KAN00175122 CRP Assignment.


vi

LIST OF FIGURES

Page vi of lxxxii Praveen – KAN00175122 CRP Assignment.


1

INTRODUCTION

1.1. Introduction

The phrase "Big Data" has expanded beyond its initial meaning as huge quantities of data
produced from various sources in the digital age. Here it serves as a priceless tool for
businesses looking to encourage creative thinking, get previously unseen information, and
make intelligent decisions. But there are several difficulties associated with the spread of big
data, especially in the areas of financials, Cybersecurity, and responsibilities in Commercial
Bank of Ceylon. The difficult balance between development and privacy is becoming more
and more important as businesses use huge databases. The goal of this study is to provide a
thorough examination of the financial, responsible, and Cybersecurity effects of big data
analytics in Commercial Bank of Ceylon. Businesses must deal with the financial challenge
of protecting private information, negotiating complicated Responsible issues, and reducing
Cybersecurity threats as they work to extract useful trends and information from massive
databases.

1.2. Purpose of research

The research discussed in this review has a broad goal and is aimed at solving a number of
important areas in the field of big data analytics. The main objectives are to increase
understanding, add to the current state of knowledge in the subject area, and give users useful
information. Among the specific goals are as follows:

Assessing Financial Implications.

 To calculate the financial implications of poor Cybersecurity in big data


analytics, include the cost of data breaches, charges from the law, and harm to
one's reputation.

Page 1 of 82 Praveen – KAN00175122 CRP Assignment.


2

 To assess how spending money on Cybersecurity improves financial


efficiency in Commercial Bank of Ceylon by lowering operational
interruptions and boosting consumer confidence.

Supporting Organizational Decision-Making.

 To give companies advice on how to include protection into big data plans in
order to reduce risks and improve value creation.

 To train users on the long-term advantages of incorporating Cyber security


into frameworks for data-driven decision-making.

Driving Future Research and Policy Development.

 To improve business and research understanding of the relationship between


big data and Cyber security.

 To help policymakers in creating strong Cyber security regulations that


promote ethically responsible and financially feasible analytics techniques.

Developing the Big Data Security and Financial Field.

 Add fresh information and perspectives to the professional and scholarly


conversation around the Financial, safety, and responsible use of big data.

 Fill in the gaps in the literature by offering an extensive investigation of how


innovation, problems with the law, and financial responsibilities meet in the
setting of big data.
Minimize All Financial Risks.
Page 2 of 82 Praveen – KAN00175122 CRP Assignment.
3

 Show the financial advantages of active Cyber security spending while


examining the financial effects of data breaches, such as the expenses of
business interruptions, negative publicity, and legal costs.

1.3. Significance of the Research

The proposed research is significant because it has a chance to significantly benefit a wide
range of stakeholders in the academic and industrial sectors. The study analyzes important
topics in the field of big data analytics, including Cyber security, financial, and responsible in
Commercial Bank of Ceylon that challenges to law. The following elements focus on the
importance of this research:

Reducing Financial Risks.

 Analyzes the financial effects of Cyber security mistakes, including data


breach costs, charges, and harm resulting from an image.

 Shows how spending money on Cyber security may reduce losses and
improve performance.

Building Organizational and Policy Frameworks.

 Provides practical advice on how companies can successfully include Cyber


security with their big data efforts.

 Helps policymakers draft equal regulations that promote innovation while


maintaining data security and financial use.

Page 3 of 82 Praveen – KAN00175122 CRP Assignment.


4

Enhancing Financial and Responsible Data Use.

 Makes sure that big data analytics follow ethical standards and legislation
regarding privacy.

 Shows how Cybersecurity protects against the improper use of private


information, building confidence among consumers and other stakeholders.

Long-Term Sustainability.

 The study supports long-term sustainability in the Big Data analytics industry
by solving sustainability issues pertaining to the energy needs of massive data
warehouses.

Increasing Public Knowledge.

 The findings of the study may help raise the understanding of the difficulties
and financial issues around big data.

 The results may motivate people to fight for their right to privacy in a time of
increasing sharing of information and digital connectivity.

Page 4 of 82 Praveen – KAN00175122 CRP Assignment.


5

1.4. Research objectives

RMO: In this research there is main objective that is to investigate the Impact of cyber
security on Responsible and financial effect of Big Data analytic. And trying to increase
understanding and offer useful guidance on improving cyber security processes.

1.5. Research Sub objectives

RSO 1: To identify the impact of role in cyber security in ensuring the responsible use of Big
Data Analytics.

RSO 2: To identify the impact of evaluating the financial impact of Big Data analytics on
Organization.

RSO 3: To identify the impact of Risk and Mitigation strategy related on cybersecurity in Big
Data Analystic.

1.6. Research questions

RQ 1: What is the Impact of cyber security on Responsible and financial effect of Big Data
analytic?

RQ 2: What is the Impact of role in cyber security in ensuring the responsible use of Big
Data Analytics?

RQ 3: What is the Impact of evaluating the financial impact of Big Data analytics on
Organization?

Page 5 of 82 Praveen – KAN00175122 CRP Assignment.


6

RQ 4: What is the Impact of Risk and Mitigation strategy related on cybersecurity in Big
Data Analystic?

1.7. Hypothesis

 RQ 1: Impact of cyber security on Responsible and financial effect of Big Data


analytic.
 Null Hypothesis:
H 0: There is no Significant Impact from the cyber security on responsible and
financial effect of Big Data Analystic.

 Alternative Hypothesis:
H 1: There is a Significant Impact from the cyber security on responsible and
financial effect of Big Data Analystic.

 RQ 2: Impact of role in cyber security in ensuring the responsible use of Big Data
Analytics.
 Null Hypothesis:
H 0: There is no Significant Impact from the role in cyber security in ensuring
the responsible use of Big Data Analystic.

 Alternative Hypothesis:
H 1: There is a Significant Impact from the role in cyber security in ensuring
the responsible use of Big Data Analystic.

 RQ 3: Impact of evaluating the financial impact of Big Data analytics on


Organization.
 Null Hypothesis:
H 0: There is no Significant Impact from the evaluating the financial impact of
Big Data analytics on Organization.

Page 6 of 82 Praveen – KAN00175122 CRP Assignment.


7

 Alternative Hypothesis:
H 1: There is a Significant Impact from the evaluating the financial impact of
Big Data analytics on Organization.

 RQ 4: Impact of Risk and Mitigation strategy related on cybersecurity in Big Data


Analystic.
 Null Hypothesis:
H 0: There is no Significant Impact from the Risk and Mitigation strategy related
on cybersecurity in Big Data Analystic.

 Alternative Hypothesis:
H 1: There is a Significant Impact from the Risk and Mitigation strategy related
on cybersecurity in Big Data Analystic.

Page 7 of 82 Praveen – KAN00175122 CRP Assignment.


8

LITERATURE REVIEW

1.8. Literature Review

Theoretical background.
Literature reviews should be related to Research main objective and Sub objectives.

Responsible and Financial Impact of Big Data Analytics.


The research "The Impact of Big Data on Business and Society" gives an insight into the two
dimensions of Big Data analytics: responsible use and financial implications. The authors
show that Big Data analytics is not only a tool to increase efficiency and profitability but also
a tool to enhance ethical practices and build societal trust. Their work is a pioneering study
that integrates theoretical and practical perspectives on the multifaceted role of Big Data
analytics. By (H. J. Chen and S. K. Zhang, 2016)

Role in cyber security in ensuring the responsible use.


This seminal work reviews the intersection of cybersecurity with the responsible use of Big
Data analytics under the heading "Cybersecurity and Ethical Governance in Big Data
Analytics". The author underscores that Big Data analytics, being an imperative part of
modern organizations nowadays, needs cybersecurity as an enabler for ethical and legal data
usage. The study underlines the dual role of cybersecurity: as a technical safeguard and as a
promoter of trust and accountability in data practices. The author discusses the ethical
implications of Big Data analytics, where cybersecurity is used as a guardrail to prevent
misuse. (D. B. Johnson, 2018)

Evaluating the financial impact of Big Data analytics on Organization.


This is the study: "Big Data Analytics: Transforming Organizational Financial Performance,"
that probes with sufficient details as to how Big Data analytics influences organizational
financial outcomes; the pathways by which it influences profitability, reduction in operational
costs, innovation in ways to bring in the bottom line. Harris's contribution is remarkable in
the context of theoretical underpinning, empirical evidence, and case studies of industries;

Page 8 of 82 Praveen – KAN00175122 CRP Assignment.


9

thus, it is considered a milestone reference to understand the financial implications of Big


Data. (M. P. Harris, 2019)

Risk and Mitigation strategy related on cybersecurity.


Comprehensive study, "Cybersecurity Risk Management: Frameworks and Mitigation
Strategies," gives an in-depth review of cybersecurity risks and the different mitigation
strategies that organizations have put in place to secure their digital infrastructure. This study
integrates theoretical underpinning, empirical research, and practical application to address
the evolving landscape of cybersecurity threats and the critical need for proactive risk
management. (M. J. Jones and K. P. Evans, 2019)

 Cybersecurity in Big Data Systems.

A key component of big data systems is cybersecurity, which makes sure that information is
protected from dangers like theft, breaches, and illegal access on Commercial Bank of
Ceylon. Big data environments are more open to attacks since they often include multiple
systems and huge databases.

Conclusion.

The large amount of existing research highlights how important cybersecurity is to providing
ethical and successful big data analytics. Solving cybersecurity issues improves
responsible effectiveness and financial results in Commercial Bank of Ceylon in addition to
protecting sensitive data. Calculating the long-term returns on cybersecurity efforts and
creating frameworks for moral handling of data in analytics-driven environments should be
the main goals of future study. The results of this research project highlight that cybersecurity
is an important strategic tool for responsible and financially successful big data analytics in

Page 9 of 82 Praveen – KAN00175122 CRP Assignment.


10

Commercial Bank, not just a technological necessity. While businesses that engage in strong
security measures get from increased trust, regulation, and operational efficiency, those that
ignore cybersecurity run the danger of serious monetary losses and ethical problems as well.

The need for a comprehensive approach to big data analytics is made clear by the interaction
among cybersecurity, responsible data management, and financial performance. By careful
evaluation of these connected elements, businesses may fully utilize big data while
maintaining the safety, responsibility, and profitability of Commercial Bank of Ceylon.

The report highlights how critical it is that Bank make cybersecurity their main concern and
an important component of their big data analytics plans. As the amount and import of data
keep increasing, cybersecurity will play an even more crucial role in determining how
analytics-driven development and decision-making develop in the future

1.9. Conceptual framework

A conceptual framework shows how your variables should relate to one another. It outlines
the pertinent goals of your research method and shows how they all work with to produce
logical outcomes.

Conceptual Framework Design.

Page 10 of 82 Praveen – KAN00175122 CRP Assignment.


11

Figure 1 conceptual Framework design for the research.

Definition of Variables

Dependent Independent Source Expected Signs


Variable Variable

Responsible and H. J. Chen & S. K. +


Financial Impact of Zhang, (2016)
Big Data Analystic.

Role in cyber D. B. Johnson, +


security in ensuring (2018)
the responsible use

Evaluating the M. P. Harris, (2019) +


financial impact of
Big Data analytics
on Organization.

Risk and Mitigation M. J. Jones & K. P. +


strategy related on Evans, (2019)
cybersecurity.

Page 11 of 82 Praveen – KAN00175122 CRP Assignment.


12

Interaction Processes.

 Prevention of Risk
Risks including insider threats, theft, and data breaches are decreased by cybersecurity. In
along with preventing financial losses and maintaining respect to legal and ethical
requirements in Commercial Bank of Ceylon, this protection improves the resilience of
operation.

 Cost-Benefit Relationships
By reducing breach-related expenses, protecting an organization's reputation, and building
customer trust, cybersecurity initiatives give a high value for investment (ROI) despite
requiring substantial resources.

 Developing Trust
Effective cybersecurity procedures show a company's attention to data responsibility. Earning
the trust of clients, partners, and officials can result in financial benefits like increased
business prospects and maintaining customers.

Practical Implications of the Framework.

 About Organizations
Businesses can use the framework as a path for combining cybersecurity with their financial
and environmental objectives. In Commercial Bank of Ceylon can create strategies that
maximize the use of resources, improve regulation, and create long-term financial stability by
comprehending these interrelated relationships.

Page 12 of 82 Praveen – KAN00175122 CRP Assignment.


13

 For Policymakers
The concept can be used by policymakers to create rules that achieve a balance between the
necessity of data innovation and the importance of responsible and financial actions. It shows
how supportive laws and regulations promote suitable data management.

 For Researchers
The standard framework provides a starting point for qualitative research, helping scholars in
examining specific elements of cyber security’s impact on responsible and financial results. It
also points up areas that need more research, such the return on investment of cybersecurity
in different business sectors

An organized method for understanding the interaction between these crucial elements is
offered by the conceptual framework used for evaluating the influence of cybersecurity on
the responsible and financial implications of big data analytics in Commercial Bank. This
model highlights the importance of an integrated approach to big data system management by
looking at the ways in which cybersecurity affects responsible data management and financial
results while taking into account the limiting impacts of external issues.

It shows how crucial it is to match cybersecurity with business goals, values, and financial
limitations in order to develop safe, reliable, and sustainable big data environments in the
bank. In the age of big data, this framework is a useful tool for researchers, companies, and
leaders to understand the complicated world of cybersecurity.

Page 13 of 82 Praveen – KAN00175122 CRP Assignment.


14

METHODOLOGY

1.10. Research philosophy

The set of ideas about the proper methods for collecting, analyzing, and applying data in a
study is known as research philosophy. The research viewpoint aids in defining the
methodology used in this study to examine the connections between cybersecurity,
responsible, and financial effects in big data analytics in Commercial Bank of Ceylon.

Onion method.

A structured technique for creating a research framework is offered by the Onion Model in
research philosophy, which originally was offered by Saunders et al. in 2006. It layers
methodological and philosophical choices, starting with general paradigms and focusing on
specific approaches. It provides that every stage of the research process is methodically
executed, resulting in a technique that is logical and well-supported. This approach is very
useful for examining how cybersecurity affects the ethical and financial effects of big data
analytics as it helps researchers to thoroughly examine methodological decisions,
philosophical foundations, and useful methods.

The Onion Method can be used in the following ways to analyze the impact of cybersecurity
on responsible and financial effects of big data analytics project in Commercial Bank of
Ceylon:

Page 14 of 82 Praveen – KAN00175122 CRP Assignment.


15

Figure 2 Research Onion method

The layers of the onion method.

I. Research Philosophy

The research's philosophical foundations are represented by the highest level of the
Research Onion. This framework directs the way one views and interpretation of
knowledge. The main areas of thought to take into consideration are:

 Positivism: Highlights quantifiable, objective facts. Positivism might be


effective if the objective of the research is to quantify the financial impact of
cybersecurity.

 Interpretivism: Analyzing personal experiences, such as how companies view


and deal with cybersecurity issues, is the main goal of Interpretivism.

Page 15 of 82 Praveen – KAN00175122 CRP Assignment.


16

 Pragmatism: Combines various viewpoints to tackle real-world issues. If the


study includes both qualitative ideas on responsible data procedures and
quantitative financial data, such an attitude could possibly fit in effectively.

 Critical Realism: analyzes root causes and mechanisms, such as how laws and
regulations affect the application of cybersecurity.

Pragmatism is maybe the best choice for this research because it allows for a range of
approaches to examine the responsible and financial elements in a full way.

II. Approaches to Theory Development

Selecting between deductive, inductive, or abdicative methods is part of this layer:

 Deductive: analyzes previous theories or hypotheses, such as the connection


between financial gains and cybersecurity spending.

 Inductive: Creates new hypotheses based on data findings; helpful for


researching new topics in responsible data management.

 Abdicative: discusses processes by switching between facts and theory.

While creative components can be used to reveal knowledge about financial problems, a
deductive strategy is suitable for testing hypotheses about the impact of cybersecurity.

III. Methodological Choice

Page 16 of 82 Praveen – KAN00175122 CRP Assignment.


17

The third layer involves technique selection:

 Quantitative: based on numerical analysis, such as statistical relationships


between financial results and cybersecurity investments.

 Qualitative: Research techniques, such discussing with cybersecurity experts


about choices to make.

 Mixed Methods: Works both strategies to provide a more thorough


knowledge.

Mixed methods are best for a balanced understanding. For example, qualitative approaches
may explore the subtleties of financial data management, while quantitative research can
quantify the financial effects

IV. Research Strategies

This layer works on choosing a plan to carry out the investigation. Among the choices
are:

 Case Studies: Perfect for delving closely into the cybersecurity procedures of
specific companies.

 Surveys: Helpful to collect general information about cybersecurity impacts


and measures from several organizations.

 Interviews: A good way to get an in-depth qualitative understanding of rules


of ethics.

Page 17 of 82 Praveen – KAN00175122 CRP Assignment.


18

 Experiments: May be performed to evaluate specific cybersecurity system


interventions.

A case study methodology, enhanced by interviews or surveys, would offer this study
broadness as well as depth

V. Time Horizons

This layer specifies if the study will be:

 Cross-Sectional: A moment in time that may be used to examine the effects of


existing cybersecurity procedures.

 Longitudinal: In time, providing the analysis of patterns and ongoing impacts.

Given how big data analytics and cybersecurity are developing, an ongoing study may
provide deeper insights but would cost more. If time and finances are limited, a cross-
sectional research might but provide helpful data

VI. Techniques and Procedures

The most complex level involves choosing certain methods for collecting and analyzing
data. Some the choices are:

 Data collection: methods include system logs, financial records, interviews,


and questionnaires.

 Data analysis: methods include theme analysis for qualitative data and
methods of statistical analysis for quantitative data.

Page 18 of 82 Praveen – KAN00175122 CRP Assignment.


19

Financial data and qualitative replies can be analyzed for this study using methods like
theme categorization and statistical analysis, etc.

1.11. Research approach

The reasoned strategy and methodological tactics used to approach the study objectives are
described in the research methodology. The technological, organizational, responsible, and
financial aspects of cybersecurity must be balanced while researching the responsible and
financial impacts of big data analytics in a commercial banking environment such as the
Commercial Bank of Ceylon. A clear research strategy guarantees methodical investigation
and evaluation of the subject. The following methodology is suggested for researching how
cybersecurity affects the responsible and financial outcomes of big data analytics at
Commercial Bank of Ceylon:

Quantitative, Qualitative, or Mixed Methods Approach.

Choosing between quantitative, qualitative, or mixed methods can often be part of the study
design:

 The quantitative approach: is centered on numerical data, including big data


analytics performance indicators, cybersecurity expenses, and financial measures. For
instance, connections between cybersecurity spending and financial results may be
quantified using statistical models. It is especially useful for financial research and
finding out the quantitative effects of cybersecurity on large data systems as it offers
reliable and objective results.
Page 19 of 82 Praveen – KAN00175122 CRP Assignment.
20

 Methods and tools


 Sources of Data:

Financial documentation of efforts in cybersecurity and their results.

Operational data proving how cybersecurity events or data breaches affect the financial
indicators.

 Analysis of Statistics:

Regression, also analysis is utilized for analyzing correlations between data such as
customer retention and cybersecurity spending.

To weigh the financial choices of cybersecurity efforts, use cost-benefit analysis.

 Advantages

 Provide easily quantifiable clear evidence of the effects on processes


and finances.

 Makes it possible to evaluate hypotheses on the connection between


financial results and cybersecurity.

 The findings can be applied to related organizations or environments

 Qualitative Approach: Using discussions, interviews, or document reviews, the


qualitative approach put a heavy focus on understanding processes in organizations,

Page 20 of 82 Praveen – KAN00175122 CRP Assignment.


21

behavior among people, and financial issues. It is ideal for researching complex topics
like responsible for data and cybersecurity trust.

 Method and tools


 Data Collection:

Interview compliance employees, IT managers, and other stakeholders in-depth.

Set up focus groups to get a range of ideas on ethics and data security.

 Methods of Analysis:

To find common themes in the experiences and attitudes of stakeholders, apply thematic
analysis.

Develop new ideas on the bank's cybersecurity procedures using fundamental concepts

 Advantages
 Captures deep, broad knowledge of the financial and responsible facets
of cybersecurity.
 Provide a contextual awareness of the difficulties and driving forces
behind financial choices.
 Gives freedom to investigate new ideas

 Mixed Method: The mixed methods approach makes use of both quantitative and
qualitative methods to maximize each of them advantages.

 Methods and Tools


 Methodical Approach:

Page 21 of 82 Praveen – KAN00175122 CRP Assignment.


22

To analyze themes and guide the design of quantitative surveys, begin with qualitative
approaches.

Quantitative analysis should be performed to evaluate the importance of the patterns found.

 Concurrent Method:
To triangulate results, concurrently gather qualitative and quantitative data.

 Integration of Data:
Combine lessons from personal accounts and numerical data using structures

 Advantages.
 Provides an in-depth analysis of how cybersecurity affects
responsibility and financial elements.

 Permits triangulation-based cross-validation of results.

 Highlights environmental details as well as quantifiable effects.

Recommended Approach: Mixed Methods.

The Mixed Methods Approach mixes qualitative and quantitative approaches to analyze
intricate research issues in a comprehensive way. This method is ideal for research on how
cybersecurity affects the responsible and financial impacts of big data analytics at
Commercial Bank of Ceylon. It provides an accurate understanding of both quantifiable
financial results and the complex ethical issues related to big data use and cybersecurity.

Page 22 of 82 Praveen – KAN00175122 CRP Assignment.


23

Structure of the Mixed Methods Approach.

1) Investigating Qualitatively

To fully understand the operational and ethical difficulties, gather qualitative information
through focus groups, interviews, and document reviews.

Find common themes, such as striking a balance between moral responsibility and financial
effectiveness.

Use the results to guide the creation of frameworks for data analysis or quantitative surveys.

2) Analysis of Quantitative Data


To determine the financial effects of cybersecurity investments, use statistical analysis.

Verify qualitative findings, such as the connection between cybersecurity and consumer trust,
by using structured surveys.

3) Combining the outcomes


Combine quantitative and qualitative data to offer a comprehensive knowledge of the study
topic.

Benefits of the Mixed Methods Approach.

 Excellent Knowledge
Includes intangible elements (like legal concerns) as well as quantifiable effects (like
financial results).

 Improved Reliability

Page 23 of 82 Praveen – KAN00175122 CRP Assignment.


24

Reduces reservations and increases reliability by cross-verifying results from several sources.

 Useful Information
Offers detailed, evidence-based suggestions for striking a balance between
responsible behavior and financial efficiency.

 Engagement of Stakeholders
Makes sure different viewpoints are taken into account, which makes the results more
applicable to more types of stakeholders.

Conclusion

The best way for analyzing how cybersecurity affects the responsible and financial impacts of
big data analytics at Commercial Bank of Ceylon is the mixed methods approach. This
method offers an extensive overview of cyber security’s role in attaining both financial
efficiency and ethical responsibility by combining scientific precision with qualitative depth.
In a world where data is becoming more and more important, it provides results that are
specific to the bank's requirements, helping it in finding a balance between profits, trust, and
regulation.

1.12. Research strategy

The research strategy is an organized plan that specifies how the goals of the research will be
achieved. It provides that the research issue is effectively addressed by offering a defined
road map for data collection, analysis, and interpretation. Several research techniques can be
used to address the different facets of the issue for the project Analyzing the Impact of
Cybersecurity on Responsible and Financial Effects of Big Data Analytics at the Commercial

Page 24 of 82 Praveen – KAN00175122 CRP Assignment.


25

Bank of Ceylon. The following research study methods are suitable given the topic's nature,
which mixes cybersecurity, financial performance, and responsible data methods:

 Exploratory research strategy

 The goal is to learn more about the unresolved issues surrounding the banking
industry's use of big data analytics and cybersecurity, with a special focus on
areas with little or no study.

 Focus: Examining possible relationships between cybersecurity financial and


results in terms of cash or reputation when the bank uses big data analytics.
This is particularly helpful if there hasn't been much research done on the link
between these factors.

 Methods: Case studies of comparable banks, exploratory surveys, and deep


discussions with experts in the field.

 Application: The results of this approach may point to unexplored areas, such
as how cybersecurity affects consumer perceptions, respect to the law, or
creative financial models in big data systems.

 Correlational Research strategy

 The goal is to analyze, with establishing cause and effect, the connection between
two or more variables (for example, the efficacy of cybersecurity measures and the
bank's financial performance).

 Focus: Analyzing how closely and in which directions cybersecurity, financial


results, and responsible big data practices are related.

Page 25 of 82 Praveen – KAN00175122 CRP Assignment.


26

 Methods: To investigate the relationship between cybersecurity procedures and


financial performance metrics (such as ROI and fraud reduction), statistical
approaches such as correlation analysis or structural equation modeling, or SEM,
can be used.

 Application: This strategy can help in determining if stronger financial results or


more attention to responsible data practices are positively correlated with
strengthened cybersecurity measures.

 Case Studies strategy

 The goal is to carefully investigate certain instances at the Commercial Bank of


Ceylon or other related banks in order to understand the ways in which cybersecurity
impacts big data analytics, financial outcomes, and ethical issues.

 Focus: Analyzing the effects of the bank's use of cybersecurity measures on its
financial results and responsible data practices by looking at particular cases.

 Methods: Document analysis, interviews with important bank stakeholders, maybe


monitoring performance metrics over time before and following cybersecurity
modifications are all part of the case studies.

 Application: This method enables a thorough, in-depth examination of the real cases,
providing in-depth knowledge of the bank's procedures and outcomes. As an example,
it may look at how a new cybersecurity strategy or data breach affected the bank's
financial performance, regulatory compliance, and consumer trust.

 Mixed Methods strategy

Page 26 of 82 Praveen – KAN00175122 CRP Assignment.


27

 The goal is to create an improved understanding of how cybersecurity affects


financial results and responsible big data analytics practices by combining qualitative
and quantitative methodologies.

 Focus: Providing a comprehensive understanding of how cybersecurity measures


affect financial performance and ethical responsibility by mixing quantitative
statistical analysis with qualitative findings from case studies and interviews.

 Techniques:

 Quantitative: Using statistical analysis to calculate the financial returns on


investments in cybersecurity (cost savings, fraud reduction).

 Qualitative: Interviews and case studies to comprehend the problems with consumer
trust, financial challenges, and responsible data management put on by procedures for
cybersecurity.

 Application: By using this method, the study would be able to provide deeper insights
into the reasons for, difficulties with, and results of cybersecurity and big data
analytics at the bank by solving both the "how much" (quantitative) and "why"
(qualitative) problems.

Conclusion

A complete assessment of the responsible and financial effects of cybersecurity in big data
analytics is made possible by this study strategy, which blends the advantages of quantitative
and qualitative methodologies. A range of approaches might be used to examine how
cybersecurity affects the responsible and financial outcomes of big data analytics at
Commercial Bank of Ceylon, but the most suitable ones include case study, descriptive,

Page 27 of 82 Praveen – KAN00175122 CRP Assignment.


28

exploratory, explanatory, and mixed methods. The researchers would be able to provide
actionable insights and a thorough grasp of the complex nature of cybersecurity in banking by
using these methods to explain the current state of issues, investigate new viewpoints,
develop causal relationships, and give a thorough case-based analysis of the operations of the
bank.

1.13. Research Choice

The word "research choice" means the choice to answer a research question or aim using a
certain research methodology or design. It requires choosing the most effective strategy or
procedures for collecting and evaluating data in order to successfully achieve the study's
objectives. Numerous research approaches, including multiple-, combined-, and mono-
method techniques, are available to research.

Making the right research strategy is important for verifying that the study offers complete,
useful, and reliable data. Choosing between quantitative, qualitative, or mixed methodologies
techniques is part of the research for the Commercial Bank of Ceylon project "Analyzing the
Impact of Cybersecurity on Responsible and Financial Effects of Big Data Analytics." Given
the project's multiple character, a mixed methods strategy is strongly suggested

Justification for Using a Mixed Methods Strategy.

The project analyzes how cybersecurity, financial performance, and responsible big data
analytics techniques connect. This includes:

 Quantifiable Impacts: Quantitative data and statistical analysis are necessary to


determine the financial consequences of cybersecurity, including cost savings, risk
reduction, and return on investment (ROI).

Page 28 of 82 Praveen – KAN00175122 CRP Assignment.


29

 Qualitative Insights: Stakeholder perspectives and qualitative data are needed to


comprehend legal effects, consumer trust, and organizational problems in
cybersecurity implementation.
By combining quantitative data with subjective and contextual insights, a mixed methods
approach offers a comprehensive picture of the problem.

Implementation of Mixed Methods in the Context of Commercial Bank of Ceylon.

 Stage of Quantification:

Collect data on investments in cybersecurity and related financial measures (e.g.,


improvement in ROI, decrease in fraud losses).

Examine past patterns in customer retention rates before to and following cybersecurity
improvements.

 Stage of Qualitative:

To learn more about the challenges of integrating cybersecurity into big data platforms,
interview IT administrators.

Examine consumer reviews to learn about legal concerns with data processing and trust
levels.

Advantages of the Mixed Methods Strategy.

 Interdisciplinary importance:

Page 29 of 82 Praveen – KAN00175122 CRP Assignment.


30

This method takes into account the study's financial, responsible, and technological aspects.

It provides that human impressions and quantifiable results are taken into account.

 Flexibility:

As new information becomes available during the study, researchers might modify the
strategy.

Further quantitative research can be guided by qualitative discoveries, and both.

 Enhanced Validation

Results from both methods are triangulated to improve the findings' precision and reliability.

The two methods' conflicting findings may reveal new areas of study.

The best research strategy for examining how cybersecurity affects the responsible and
financial results of big data analytics at the Commercial Bank of Ceylon is the Mixed
Methods Strategy. This method explores the moral and responsible action related to the use
of big data in while also guaranteeing an extensive understanding of the financial
implications. This research decision will yield useful findings that are in line with the bank's
operational objectives, client trust, and regulatory needs by fusing quantitative rigor with
qualitative detail.

Page 30 of 82 Praveen – KAN00175122 CRP Assignment.


31

1.14. Time frame

Table 1 time frame table

Activity Description Duration

Objective Setting Define project limits, communicate with 15 days


and Scoping stakeholders, and specify research
objectives.

Literature Review To find gaps and create the conceptual 10 days


and Framework framework, carefully evaluate the record
Development of previous research.

Responsibility Make sure that data privacy laws are 10 days


Approval followed and submit the study idea to the
regulatory board.

Quantitative Data Collect financial documents, send out 5 days


Collection questionnaires, and compile quantitative
information about cybersecurity risks and
return on effort.

Qualitative Data To learn more about cybersecurity 5 days


Collection procedures and issues, hold focus groups,
interviews, and legal document analyses.

Quantitative Data Use statistical methods to examine 15 days


Analysis numerical data in order to find patterns and
relationships.

Qualitative Data To find repeated patterns, use theme 15 days


Analysis analysis on review documents and
interviews.

Integration of Mix quantitative and qualitative data to 20 days

Page 31 of 82 Praveen – KAN00175122 CRP Assignment.


32

Findings have a complete understanding of the


effects of cybersecurity.

Drafting the Analyze results, analyze information, and 15 days


Research Report provide solutions depending on the goals
of the research.

Stakeholder Give important stakeholders an idea of the 5 days


Feedback findings and include their comments in the
finished report

Final Report Send the final, completed report to the 20 days


Submission bank and other appropriate parties.

Presentation of Give conclusions and suggestions in an 10 days


Results executive briefing or workshop

Archiving and Perform project closeout reviews and 10 days.


Closeout safely save research findings for later use.

1.15. Data collection procedures

The most important stage in the study process is collecting data, particularly for a project that
analyzes how cybersecurity affects responsibility and financial components of a banking
organization. In the framework of the Commercial Bank of Ceylon, the research project
"Analyzing the Impact of Cybersecurity on Responsible and Financial Effects of Big Data
Analytics" uses a methodical strategy to collect both quantitative and qualitative data. These
processes were created to provide complete, reliable, and dependable understanding of how
cybersecurity affects responsible and financial performance.

The following detailed methods for collecting data are suggested for the Commercial Bank of
Ceylon:

Identify Data Sources.


Page 32 of 82 Praveen – KAN00175122 CRP Assignment.
33

Data will be collected from many primary and secondary sources to make sure an extensive
analysis:

 Primary Data Sources :

Workers in cybersecurity and IT departments.

The bank's analysts and financial analysts.

Important decision-makers, including compliance officials and risk managers.

 Secondary Data Sources:

Financial reports and records of the bank.

Provides of incidents involving previous cybersecurity breaches.

Documentation regarding compliance and environmental standards.

Case studies and published works on cybersecurity and big data analytics.

Identify Data collection methods.

A. Quantitative Data Collection.

When analyzing the monetary effects and quantifiable results related to cybersecurity big data
analytics, quantitative data is crucial. Among the steps are:

 Questionnaires & Surveys:

Page 33 of 82 Praveen – KAN00175122 CRP Assignment.


34

Designed for bank workers in order to collect data on financial ramifications, perceived
cybersecurity threats, and the efficacy of created solutions.

With responses questions are used in surveys to help with quantitative analysis.

 Analysis of Financial Data:


Collecting information on incident response expenses, cybersecurity spending, and ROI in
big data technology.

Centered on cybersecurity budget allocation and how it impacts financial success metrics.

 Analytics information and incident logs:


Analyzing records pertaining to attempted cyber-attacks, security breaches, and data analytics
performance indicators.

Analyzes the financial impact of cybersecurity incident prevention, frequency, and severity.

B. Qualitative Data Collection

Qualitative methods represent complex viewpoints and organizational behaviors while


offering context and depth. Among the procedures are:

 Interviews:
Formal to informal interviews with top executives, legal officials, and IT managers.

Requires to provide strategic insights on the function of cybersecurity in maintaining ethical


financial practices.

 Focus Groups:

Page 34 of 82 Praveen – KAN00175122 CRP Assignment.


35

Exploring issues and best practices with a variety of stakeholders, such as the operations,
finance, and IT departments.

Supports teamwork in the search for efficient cybersecurity solutions.

 Review of the Document:


Examining governance frameworks, compliance records, and policies to determine how well
institutions conform to cybersecurity requirements.

Examines compliance with legal standards, including orders from the Commercial Bank.

1.1.1. Type of Data

Data can be grouped according to a number of criteria in the context of examining how
cybersecurity affects the ethical and financial effects of big data analytics. An outline of the
several kinds of data that might be used for the research is provided as follows:

1. Primary Data.

For the specific objective of the research, the primary data is collected direct from the
original sources. Through personal interviews with workers at the Commercial Bank of
Ceylon and other relevant sources, primary data for this project will be collected.

 Quantitative Data

Since this kind of data is numerical, techniques from statistics may be applied to examine it.
It is often used to evaluate the quantifiable results, performance, and financial effect
connected to big data analytics and cybersecurity.

Page 35 of 82 Praveen – KAN00175122 CRP Assignment.


36

For example:

 Define that's been set specifically for cybersecurity.


 Number of cyber-attacks that have been identified and prevented over time.
 Financial loss brought on by cybersecurity incidents.

 Qualitative Data
This kind of data is informal and visual. It provides background information, ideas, and an
extensive understanding of actions, views, and opinions.

For example:

 Information into the bank's cybersecurity strategy collected from top management
interviews.
 Focus group responses about acceptable data use and how it affects consumer trust.
 Findings from compliance checks or cybersecurity audits.

2. Secondary Data.

Information that was already collected, examined, and released for different reasons but is
pertinent to the current study is referred to as secondary data. Secondary data might offer
standards, historical background, or different perspectives on the effects of cybersecurity.

 Financial Documents:
Data from the bank's prior financial reports, including annual reports, cybersecurity financial
spaces, and reports describing monetary losses brought on by data breaches or cyber threats.

Page 36 of 82 Praveen – KAN00175122 CRP Assignment.


37

For example:

 Data on monthly financial performance that highlights the relationship between


operational effectiveness and cybersecurity costs.
 Information from the past about cybersecurity breaches and the bank's financial
effects

 Regulation and Compliance Data:

In public available rules, regulations, and frameworks pertaining to cybersecurity standards


that the bank must follow.

For example:

 Bank rules pertaining to financial organizations' cybersecurity and data security.


 International cybersecurity guidelines, such GDPR or ISO/IEC 27001, and how they
affect bank operations.

 Case studies and industry reports:

Releases and studies from other institutions, think tanks, or organizations that provide
information about the wide effects of cybersecurity on financial results and responsibility.

For example:

 Reports on the financial impact of cybersecurity developments in the banking


industry.

Page 37 of 82 Praveen – KAN00175122 CRP Assignment.


38

 Examples of other financial organizations or banks dealing with cybersecurity issues.

1.1.2. Data Collection Method

A key stage in any research process is data collecting, which provides the capture of precise
and pertinent information for achieving the goals of the research. In the frame of big data
analytics, efficient collection of data is the key to fully understand the effects of cybersecurity
on responsibility and financial effects. The Commercial Bank of Ceylon is using a mixed-
methods approach to collect data for this project, using quantitative and qualitative Data
collection methods. For sure a complete understanding of the topic, this method combine
both qualitative and quantitative methods.

1. Quantitative Data Collection Method.

The goal of the quantitative data collecting method is to collect identifiable, numerical data
that can be analyzed using statistics so as to evaluate the operational and financial effects of
cybersecurity.

 Questionnaires
Goal: To compile information on consumer satisfaction, perceptions, and trust in the bank's
cybersecurity procedures.

Respondents: Clients of banks who use digital services like mobile applications or internet
banking.

Workers who participate in or are affected by cybersecurity measures, directly or indirectly.

Method: Organized surveys that were sent by SMS, email, or hard copy at bank locations.
With responses questions to measure degrees of satisfaction and trust.

Questions on knowledge of cybersecurity threats and how they affect service use.

Page 38 of 82 Praveen – KAN00175122 CRP Assignment.


39

 Forms for Customer Feedback

The goal is to get firsthand feedback from customers on how to deal with cybersecurity-
related problems, such as scam efforts or data breaches.

Distribution Channels: Customer portals with online forms incorporated. Workers' feedback
devices.

2. Qualitative Data Collection Method.

The goal of the qualitative data collecting approach is to collect complete, descriptive
information in order to analyze the subjective characteristics of cyber security’s influence on
responsible and financial behavior.

 Partially Organized Interviews

Goal: To learn more about the viewpoints of the bank's stakeholders. Members include
professionals in cybersecurity and IT managers.

Employees of the finance department. Senior executives and compliance officials.

Method: Using open-ended questions, investigate the difficulties, methods, and choices that
go into cybersecurity projects.

Questions about handling consumer data in a responsible way.

 Analysis of Documents

Goal: To assess the bank's cybersecurity and data analytics regulations, compliance
frameworks, and reports of audit.

Page 39 of 82 Praveen – KAN00175122 CRP Assignment.


40

Examined Documents: Internal cybersecurity guidelines and procedures.

Documentation showing regulatory compliance such as the GDPR and Sri Lanka's Personal
Data Protection Act.

Audit reports that show how well cybersecurity measures work.

This project's methods for collecting data combine qualitative and quantitative precision to
examine how cybersecurity affects the Commercial Bank of Ceylon's financial and
responsible results. The research provides a thorough grasp of how cybersecurity improves
responsible and financial performance in the context of big data analytics by combining a
variety of data sources, including financial records, IT evaluations, surveys, interviews, and
document analysis. Because these techniques adhere to moral and legal requirements, the
results are accurate and useful.

1.1.3. Data Collection and Analyze Tools

1. Data Collection Tools.

 Surveys

One of the main methods for gathering quantitative data from bank staff and clients is the use
of surveys. They are employed to evaluate opinions, contentment, and confidence in
cybersecurity procedures.

Tools Used:

 Survey Monkey, Microsoft Forms, or Google Forms: These online resources are easy
to use and help with distribution, as well as primarily by SMS and email.
 Mobile Apps: Survey response rates can be improved by including them into the
bank's current mobile app platform.

Page 40 of 82 Praveen – KAN00175122 CRP Assignment.


41

 Paper Surveys: Paper-based surveys are given out at bank locations to clients who
want simpler methods.

 Analysis of Documents

Analyzing both external and internal documents pertaining to the bank's cybersecurity
procedures provides useful data.

Tools used:

 Adobe Acrobat Readers & Analyzers: For examining and analyzing audit papers,
compliance reports, and regulations.
 Knowledge management platforms are internal systems that the bank uses to keep
operational and legal records

2. Data Analyze Tools.

In order to understand the data collected, identify important patterns, and make inferences,
data analysis tools are important. For this research, both quantitative and qualitative analytic
methods are used.

 Tools for Quantitative Analysis

The goal of quantitative data analysis is to quantify relationships, trends, and impacts using
statistical and numerical tools.

Tools Used:

Page 41 of 82 Praveen – KAN00175122 CRP Assignment.


42

 Statistical Software (SPSS, R, or Python): For carrying out complex statistical


analysis, including regression, correlation, and hypothesis testing, statistical software
(SPSS, R, or Python) is required.
 Microsoft Excel: For simple statistical operations including calculating averages,
calculating percentages, and displaying data in graphs and charts.
 Tableau or Power BI: For viewing operational data and financial trends and building
flexible dashboards.

 Tools for Qualitative Analysis

Interpreting qualitative data in order to identify themes, patterns, and findings is known as
qualitative data analysis.

Tools Used:

 NVivo: is an effective tool for defining and examining qualitative data from
documents, focus groups, and interviews.
 MAXQDA: Another tool for classifying and evaluating qualitative text data is
MAXQDA.
 Thematic Analysis Frameworks: Methods for finding important themes in written
work that can be done manually or with the use of tools

1.16. Sampling

A key element of research technique is sampling, which is the process of choosing a specific
group of people, things, or documents from a broader population. By using this subset, or
sample, to draw conclusions about the population, the research is kept correct but being
feasible, cost-effective, and time-efficient.

Page 42 of 82 Praveen – KAN00175122 CRP Assignment.


43

Sampling Techniques.

Probability sampling and non-probability sampling are the two primary groups into which
sampling techniques fall. Each offers special benefits and use cases.

1. Probability sampling.
By providing that each individual in the population has a comparable possibility of being
chosen, probability sampling lowers unfairness and improves that they are representative.

 Using Stratified Sampling

 Definition: Samples are selected proportionately from each group once the
population is divided up into subgroups (strata) based on specific
characteristics.
 Application: Provides representation among client the population, including
age, income brackets, and financial service type (corporate or retail).
 A hypothetical scenario would be to separate clients into age categories and
choose participants equally from each group.

 Simple Random Sampling

 Definition: From the population, participants are chosen at random.


 Use: Beneficial for choosing from a wide range of bank clients.
 Example: Choosing client IDs from the bank's database using a random
number generator.

2. The Non-Probability Sampling

Page 43 of 82 Praveen – KAN00175122 CRP Assignment.


44

Non-probability sampling, which is often used when unique or specialized data is needed,
entails choosing individuals according to specific requirements.

 Using Purposive Sampling

 Definition: Participants are selected according to how well they fit the goals of the
study.
 Application: Choosing staff members with financial management or cybersecurity
experience.
 Interviewing compliance officers or IT managers who have personally worked with
the bank's cybersecurity tactics is one example.

 Easy Sampling

 Definition: The selection of participants is based on availability.


 Use: Beneficial for obtaining initial information from clients who come into a branch.
 For example, surveying bank customers who come in during a certain week.

In conclusion, the use of stratified sampling is a good fit for the complex responsible,
financial, and cybersecurity implications of big data analytics. It enables a focused and
methodical evaluation of numerous elements of the research topic, saving resources and
improving the reliability and relevance of the findings of the research.

1.1.4. Sampling Strategy

Any research project must include a sampling strategy as it explains how participants will be
chosen to make sure that the data is representative and relevant to the goals of the research.
The goal of the research is to understand how cybersecurity affects the Commercial Bank of

Page 44 of 82 Praveen – KAN00175122 CRP Assignment.


45

Ceylon's financial results and responsible business practices. The stratified random selection
method was selected as the best strategy due to the selected population's complex and variety.

A reliable and systematic method for dividing the population into discrete subgroups, also
known based on common characteristics is the stratified sampling strategy. Because of the
wide range of stakeholders participating in the project "Analyzing the Impact of
Cybersecurity on Responsible and Financial Effects of Big Data Analytics in the Commercial
Bank of Ceylon," this method is specifically useful.

The justification for stratified sampling

The following variables guided the selection of the stratified sampling method:

Diverse Population: The Commercial Bank of Ceylon serves a wide range of clients,
including corporate and retail clients, as well as personnel from different departments.

Accurate Representation: The sample captures the viewpoints of all pertinent subgroups by
stratifying according to important attributes (role, department, and client type).

When compared to ordinary random sampling, enhanced precision lowers sample bias and
boosts result dependability.

By focusing on relevance, the researcher may choose the most suitable people to get
understanding of how cybersecurity affects responsible and financial performance.

Benefits of Stratified Sampling.

 Improved Representativeness: Provides that the sample includes smaller but crucial
subgroups, such as compliance managers.
 Increased Accuracy: By focusing on homogeneous groups, sampling error is
minimized.

Page 45 of 82 Praveen – KAN00175122 CRP Assignment.


46

 Analyzing the financial impacts of cybersecurity on corporate vs consumer markets is


one example of an effective comparison that makes subgroup analysis easier.
 Effective Use of Resources: Minimizes the need to survey all people by focusing on
particular groups.

The Commercial Bank of Ceylon's expanded population makes the stratified sample approach
the perfect choice for this study. The method provides representativeness, reduces bias, and
permits detailed analysis of subgroups by dividing the population into relevant strata and
sampling equally within each group. Finding useful information into how cybersecurity
affects the responsible and financial facets of big data analytics requires a planned strategy.

1.1.5. Sample Size

An important variable in determining the validity, precision, and universality of research


findings is sample size. In order to reflect the target the population, the study's participant
count is referred to. To make sure that the data truly represents the actual impact of
cybersecurity on responsibility and financial effects inside the bank's operations, it is crucial
to choose a sufficient sample size for this project in order to capture a range of opinions from
Commercial Bank of Ceylon workers and customers.

Important Considerations Consider When Calculating Sample Size

 The target audience:


Internal stakeholders: Bank workers, especially those in risk management, finance, IT,
cybersecurity, and compliance divisions.

Customers, including corporate and retail clients, are examples of external stakeholders.

 Level of Confidence:

Page 46 of 82 Praveen – KAN00175122 CRP Assignment.


47

A 95% confidence level is selected, which indicates that there is a 95% chance the findings
will correctly reflect the features of the population.

 Error margin:
An appropriate degree of reliability is ensured with a ±5% margin of error.

 Proportion Estimate (p):


Assuming that the sample will represent a range of viewpoints with most significant
variability (P=0.5).

 Size of Population (N):


Internal stakeholders include about 1,000 workers.

About 10,000 active consumers are considered external stakeholders.

Formula for Sample Size

For a finite population, the sample size (n) is determined using the formula below:

Figure 3Sample Size Formula

Where:

n = the necessary sample size

Page 47 of 82 Praveen – KAN00175122 CRP Assignment.


48

N = population size overall

Z-score = Z (1.96 at 95% chance)

At 0.5 for greatest variability, p is the calculated percentage.

e = error margin (±5%)

Final Sample Size

 Internal Stakeholders (Employees): 278 participants.


 External Stakeholders (Customers): 370 participants.
 Total Sample Size: 648 participants.

So as to balance universality, resource efficiency, and statistical reliability, a sample size of


648 people is chosen. This strategy provides that the Commercial Bank of Ceylon's employee
and consumer information fully capture the impact of cybersecurity on responsible and
financial outcomes in big data analytics.

1.17. The selection of participants

The most important step in research is participant selection, which defines the reliability and
representation of the data collected. The objective of the research is to collect views from a
wide range of stakeholders who are affected in some way by the bank's big data analytics and
cybersecurity procedures. One of the top banks in Sri Lanka, the Commercial Bank of Ceylon
has many different stakeholders, such as staff, management, and clients. To make sure an
accurate understanding of the bank's environment, the participants are selected from among
internal stakeholders (workers) and external stakeholders (customers).

Page 48 of 82 Praveen – KAN00175122 CRP Assignment.


49

Procedure for Selecting Participants

 Identifying Participants:
Internal Stakeholders: Identify workers using specified requirements by using the bank's HR
database.

To create a shortlist of possible participants, work with the heads of departments.

 External Stakeholders:
Segment consumers using the bank's customer relationship management (CRM) system.

Pay close attention to current clients who have used digital services in the year before.

Sending Out Invitations

 To maintain reliability, participants are invited through formal methods including


phone calls, emails, or physical invites.
 Invitations to consumers provide information about the project's objectives,
confidentiality protocols, and free nature.

Making Certain Willing Involvement

 Incentives: To promote involvement, little prizes are provided, such as certificates or


service discounts.
 Transparency: Clearly state the goals of the study and how the data will be used.
 Flexibility: To fulfill preferences, provide choices for both in-person and online
commitment.

Ethical Consideration

Page 49 of 82 Praveen – KAN00175122 CRP Assignment.


50

 Informed Consent: the participants get information about the research's goals, their
rights, and the intended use of their data. Before participation, written or online
consent is collected.

 Confidentiality: To maintain participant identities, personal data is removed.

 Voluntary Participation: There are no implications for choosing not to participate;


participation is completely voluntary.

 Fair Selection: Participants are chosen without exclusion, promoting inclusion and
balance.

Justification for Selection Method

 Detailed Representation
By collect both employees and customers, the research is sure to include both internal and
externally points of view, improving the analysis.

 Importance to Research Objectives


Workers shed light on the financial and operational effects of cybersecurity.

Consumers comment on how the bank's cybersecurity efforts have affected their levels of
satisfaction and trust.

 Balance and Capital


By ensuring a fair representation across subgroups, stratification random selection reduces
bias.

Page 50 of 82 Praveen – KAN00175122 CRP Assignment.


51

 Realistic Possibility
The plan provides a feasible just exact approach by conforming to schedules, ethical
standards, and available resources.

The research's participant selection process has been carefully planned out for equal
treatment, inclusiveness, and connection with the goals of the research. The research provides
complete and representative collection of data by integrating internal stakeholders (workers)
and external stakeholders (customers) and using a stratified random sample procedure. The
participant selection process's trust is further supported by ethical concerns, flexibility, and
practical tests, which provide a solid basis for examining how cybersecurity affects the
Commercial Bank of Ceylon's financial and responsible effects.

GANTT CHART.

Figure 4 Gantt chart

Page 51 of 82 Praveen – KAN00175122 CRP Assignment.


52

REFERENCES

Page 52 of 82 Praveen – KAN00175122 CRP Assignment.

You might also like