Higher Nationals
Higher Nationals
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC Higher National Diploma in Computing
Give details:
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
3
LO1 Examine appropriate research methodologies and approaches as part of the research process
Resubmission Feedback:
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Assessor Date
signature
[email protected]
Student Date
signature
6
Pearson
Higher Nationals in
Computing
Unit 16: Computing Research Project
(Pearson Set)
Research Project Proposal
7
8
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your
work.
2. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
8. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will
then be asked to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
9
10
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct way. I further understand what it means
to copy another’s work.
Assignment Brief
Student Name /ID Number Praveen Maheesha – KAN00175122
Unit Number and Title Unit 16: Computing Research Project (Pearson Set)
Academic Year
Unit Tutor
Issue Date
Submission Date
Submission Format:
Research Project Proposal
The submission is in the form of an individual written report.
This should be written in a concise, formal business style using single spacing and font size 12.
You are required to make use of headings, paragraphs and subsections as appropriate, and all
work must be supported with research.
Reference using the Harvard referencing system.
Please provide a referencing list using the Harvard referencing system.
The recommended word limit is minimum 2000 words.
defined as data that is generated in incredibly large volumes, such as internet search queries,
data from weather sensors or information posted on social media. Today big data has also come
to represent large amounts of information generated from multiple sources that cannot be
processed in a conventional way and that cannot be processed by humans without some form of
computational intervention.
Big data can be stored in several ways: Structured, whereby the data is organised into some form
of relational format, unstructured, where data is held as raw, unorganised data prior to turning
into a structured form, or semi-structured where the data will have some key definitions or
structural form but is still held in a format that does not conform to standard data storage
models.
Many systems and organisations now generate massive quantities of big data on a daily basis,
with some of this data being made publicly available to other systems for analysis and processing.
The generation of such large amounts of data has necessitated the development of machine
learning systems that can sift through the data to rapidly identify patterns, to answer questions or
to solve problems. As these new systems continue to be developed and refined, a new discipline
of data science analytics has evolved to help design, build and test these new machine learning
and artificial intelligence systems.
Utilising Big Data requires a range of knowledge and skills across a broad spectrum of areas and
consequently opens opportunities to organisations that were not previously accessible. The
ability to store and process large quantities of data from multiple sources has meant that
organisations and businesses are able to get a larger overall picture of the pattern of global trends
in the data to allow them to make more accurate and up to date decisions. Such data can be used
to identify potential business risks earlier and to make sure that costs are minimised without
compromising on innovation.
However, the rapid application and use of Big Data has raised several concerns. The storage of
13
such large amounts of data means that security concerns need to be addressed in case the data is
compromised or altered in such a way to make the interpretation erroneous. In addition, the
ethical issues of the storage of personal data from multiple sources have yet to be addressed, as
well as any sustainability concerns in the energy requirements of large data warehouses and
lakes.
The theme will enable students to explore some of the topics concerned with Big Data from the
standpoint of a prospective computing professional or data scientist. It will provide the
opportunity for students to investigate the applications, benefits and limitations of Big Data while
exploring the responsibilities and solutions to the problems it is being used to solve.
Choosing a research objective/question
Students are to choose their own research topic for this unit. Strong research projects are those
with clear, well focused and defined objectives. A central skill in selecting a research objective is
the ability to select a suitable and focused research objective. One of the best ways to do this is to
put it in the form of a question. Students should be encouraged by tutors to discuss a variety of
topics related to the theme to generate ideas for a good research objective.
The range of topics discussed on Big Data, could cover the following areas:
Storage models
Cyber security risks
Future developments and driving innovation.
Legal and ethical trade-offs
of study. (This would provide existing knowledge and benchmarks by which the data can be
judged)
3. Examine and critically evaluate research methodologies and research processes available.
Select the most suitable methodologies and the process and justify your choice based on
theoretical/philosophical frameworks. Demonstrate understanding of the pitfalls and
limitations of the methods chosen and ethical issues that might arise.
4. Draw points (1–3, above) together into a research proposal by getting agreement with your
tutor.
15
Useful links
Useful resources for underlying principles, examples of articles and webinars on the theme:
Resourc
e Type of
Resource Titles Links
Resource
Number
Resourc
e Type of
Resource Titles Links
Resource
Number
strategy-and-big-data-analytics
https://www.sciencedirect.com/book/9780128156094/principles-and-
14 Book Principles and Practice of Big
practice-of-big-data
Resourc
e Type of
Resource Titles Links
Resource
Number
Critical analysis of Big Data challenges and analytical
24 Journal https://www.sciencedirect.com/science/article/pii/S014829631630488X
methods
25 Journal Big Data Security Issues and Challenges https://tinyurl.com/wabx7zya
26 Journal IoT Big Data Security and Privacy Versus Innovation https://ieeexplore.ieee.org/abstract /document/8643026
27 Journal Big Data Security and Privacy Protection https://www.atlantis-press.com/proceedings/icmcs18/25904185
https://journalofcloudcomputing.springeropen.com/articles/10.1186/
28 Journal Big data analytics in Cloud computing: an overview
s13677-022-00301-w
Grading Rubric
Centre Name
Unit Unit 16: Computing Research Project (Pearson Set)
Tutor Ms. Shyamali
Proposed title
Title or working title of research project (in the form of a question, objective or hypothesis):
Research project objectives (e.g. what is the question you want to answer? What do you want to
learn how to do? What do you want to find out?): Introduction, Objective, Sub Objective(s),
Research Questions and/or Hypothesis
I confirm that the project is not work which has been or will be submitted for another qualification
and is appropriate.
Interviews:
Questionnaires: ✘
Observations:
Use of Personal Records:
Data Analysis:
Action Research:
Focus Groups:
Other (please specify): ...........................................................
Section 3: Participants
Please answer the following questions, giving full details where necessary.
Will your research involve human participants?
Describe the processes you will use to inform participants about what you are doing:
Will participants be given the option of omitting questions they do not wish to answer?
Yes ✘ No
If “NO” please explain why below and ensure that you cover any ethical issues arising from this.
Confirm whether participants will be asked for their informed consent to be observed.
Yes No ✘
Will you debrief participants at the end of their participation (i.e. give them a brief explanation of
the study)?
Yes ✘ No
Will participants be given information about the findings of your study? (This could be a brief
summary of your findings in general)
Yes No ✘
Confirm that all personal data will be stored and processed in compliance with the Data
Protection Act (1998)
Yes No
Who will have access to the data and personal information?
How long will the data and records be kept for and in what format?
Section 6: Declaration
I have read, understood and will abide by the institution’s Research and Ethics Policy:
Yes ✘ No
I have discussed the ethical issues relating to my research with my Unit Tutor:
Yes No
I confirm that to the best of my knowledge:
The above information is correct and that this is a full description of the ethics issues that may
arise in the course of my research.
Name:
Date:
Please submit your completed form to: ESOFT Learning Management System (ELMS)
By
Praveen
KAN00175122
ACKNOWLEDGMENT
EXECUTIVE SUMMARY
The executive summary offers a succinct synopsis of the study, emphasizing its goals, main
conclusions, and ramifications. We analyzed the complicated field of Big Data analytics in
our research in Commercial Bank of Ceylon, focused on cyber security, analyzing the impact
of Cybersecurity in Responsible, and Financial effect of Big Data Analytics in Commercial
Bank of Ceylon assess Cybersecurity risks, analyze responsible and financial effects, and
create suitable techniques for using data. By examining important sources from literature and
research, we found a strong relationship between an organization's capacity to successfully
handle obstacles, Cybersecurity measures, and compliance with responsible as well as
financial standards. The results emphasized how crucial it is to combine ethical standards,
responsible compliance, and to encourage financial data use, incorporate Cybersecurity
resilience into Big Data analytics procedures. Reduce the hazards. Methods for improving the
management of data, openness, and trust in data-driven decision-making processes are
informed by the research, which offers insightful information to researchers, businesses, and
leaders.
CONTENTS
ACKNOWLEDGMENT................................................................................................................. i
EXECUTIVE SUMMARY..............................................................................................................ii
CONTENTS............................................................................................................................... iii
LIST OF TABLES......................................................................................................................... v
LIST OF FIGURES.......................................................................................................................vi
INTRODUCTION........................................................................................................................ 1
1.1. Introduction............................................................................................................... 1
1.2. Purpose of research....................................................................................................1
1.3. Significance of the Research......................................................................................3
1.4. Research objectives....................................................................................................5
1.5. Research Sub objectives............................................................................................ 5
1.6. Research questions.....................................................................................................5
1.7. Hypothesis................................................................................................................. 6
LITERATURE REVIEW.................................................................................................................8
2.1. Literature Review...................................................................................................... 8
2.2. Conceptual framework.............................................................................................17
METHODOLOGY......................................................................................................................21
3.1. Research philosophy................................................................................................21
3.2. Research approach...................................................................................................26
3.3. Research strategy.....................................................................................................31
3.4. Research Choice...................................................................................................... 35
3.5. Time frame.............................................................................................................. 38
3.6. Data collection procedures.......................................................................................39
3.6.1. Type of Data..................................................................................................... 42
3.6.2. Data Collection Method....................................................................................45
3.6.3. Data Collection and Analyze Tools....................................................................47
3.7. Sampling..................................................................................................................49
3.7.1. Sampling Strategy.............................................................................................51
3.7.2. Sample Size.......................................................................................................53
3.8. The selection of participants....................................................................................55
Gantt chart............................................................................................................................. 58
REFERENCES........................................................................................................................... 59
LIST OF TABLES
LIST OF FIGURES
INTRODUCTION
1.1. Introduction
The phrase "Big Data" has expanded beyond its initial meaning as huge quantities of data
produced from various sources in the digital age. Here it serves as a priceless tool for
businesses looking to encourage creative thinking, get previously unseen information, and
make intelligent decisions. But there are several difficulties associated with the spread of big
data, especially in the areas of financials, Cybersecurity, and responsibilities in Commercial
Bank of Ceylon. The difficult balance between development and privacy is becoming more
and more important as businesses use huge databases. The goal of this study is to provide a
thorough examination of the financial, responsible, and Cybersecurity effects of big data
analytics in Commercial Bank of Ceylon. Businesses must deal with the financial challenge
of protecting private information, negotiating complicated Responsible issues, and reducing
Cybersecurity threats as they work to extract useful trends and information from massive
databases.
The research discussed in this review has a broad goal and is aimed at solving a number of
important areas in the field of big data analytics. The main objectives are to increase
understanding, add to the current state of knowledge in the subject area, and give users useful
information. Among the specific goals are as follows:
To give companies advice on how to include protection into big data plans in
order to reduce risks and improve value creation.
The proposed research is significant because it has a chance to significantly benefit a wide
range of stakeholders in the academic and industrial sectors. The study analyzes important
topics in the field of big data analytics, including Cyber security, financial, and responsible in
Commercial Bank of Ceylon that challenges to law. The following elements focus on the
importance of this research:
Shows how spending money on Cyber security may reduce losses and
improve performance.
Makes sure that big data analytics follow ethical standards and legislation
regarding privacy.
Long-Term Sustainability.
The study supports long-term sustainability in the Big Data analytics industry
by solving sustainability issues pertaining to the energy needs of massive data
warehouses.
The findings of the study may help raise the understanding of the difficulties
and financial issues around big data.
The results may motivate people to fight for their right to privacy in a time of
increasing sharing of information and digital connectivity.
RMO: In this research there is main objective that is to investigate the Impact of cyber
security on Responsible and financial effect of Big Data analytic. And trying to increase
understanding and offer useful guidance on improving cyber security processes.
RSO 1: To identify the impact of role in cyber security in ensuring the responsible use of Big
Data Analytics.
RSO 2: To identify the impact of evaluating the financial impact of Big Data analytics on
Organization.
RSO 3: To identify the impact of Risk and Mitigation strategy related on cybersecurity in Big
Data Analystic.
RQ 1: What is the Impact of cyber security on Responsible and financial effect of Big Data
analytic?
RQ 2: What is the Impact of role in cyber security in ensuring the responsible use of Big
Data Analytics?
RQ 3: What is the Impact of evaluating the financial impact of Big Data analytics on
Organization?
RQ 4: What is the Impact of Risk and Mitigation strategy related on cybersecurity in Big
Data Analystic?
1.7. Hypothesis
Alternative Hypothesis:
H 1: There is a Significant Impact from the cyber security on responsible and
financial effect of Big Data Analystic.
RQ 2: Impact of role in cyber security in ensuring the responsible use of Big Data
Analytics.
Null Hypothesis:
H 0: There is no Significant Impact from the role in cyber security in ensuring
the responsible use of Big Data Analystic.
Alternative Hypothesis:
H 1: There is a Significant Impact from the role in cyber security in ensuring
the responsible use of Big Data Analystic.
Alternative Hypothesis:
H 1: There is a Significant Impact from the evaluating the financial impact of
Big Data analytics on Organization.
Alternative Hypothesis:
H 1: There is a Significant Impact from the Risk and Mitigation strategy related
on cybersecurity in Big Data Analystic.
LITERATURE REVIEW
Theoretical background.
Literature reviews should be related to Research main objective and Sub objectives.
A key component of big data systems is cybersecurity, which makes sure that information is
protected from dangers like theft, breaches, and illegal access on Commercial Bank of
Ceylon. Big data environments are more open to attacks since they often include multiple
systems and huge databases.
Conclusion.
The large amount of existing research highlights how important cybersecurity is to providing
ethical and successful big data analytics. Solving cybersecurity issues improves
responsible effectiveness and financial results in Commercial Bank of Ceylon in addition to
protecting sensitive data. Calculating the long-term returns on cybersecurity efforts and
creating frameworks for moral handling of data in analytics-driven environments should be
the main goals of future study. The results of this research project highlight that cybersecurity
is an important strategic tool for responsible and financially successful big data analytics in
Commercial Bank, not just a technological necessity. While businesses that engage in strong
security measures get from increased trust, regulation, and operational efficiency, those that
ignore cybersecurity run the danger of serious monetary losses and ethical problems as well.
The need for a comprehensive approach to big data analytics is made clear by the interaction
among cybersecurity, responsible data management, and financial performance. By careful
evaluation of these connected elements, businesses may fully utilize big data while
maintaining the safety, responsibility, and profitability of Commercial Bank of Ceylon.
The report highlights how critical it is that Bank make cybersecurity their main concern and
an important component of their big data analytics plans. As the amount and import of data
keep increasing, cybersecurity will play an even more crucial role in determining how
analytics-driven development and decision-making develop in the future
A conceptual framework shows how your variables should relate to one another. It outlines
the pertinent goals of your research method and shows how they all work with to produce
logical outcomes.
Definition of Variables
Interaction Processes.
Prevention of Risk
Risks including insider threats, theft, and data breaches are decreased by cybersecurity. In
along with preventing financial losses and maintaining respect to legal and ethical
requirements in Commercial Bank of Ceylon, this protection improves the resilience of
operation.
Cost-Benefit Relationships
By reducing breach-related expenses, protecting an organization's reputation, and building
customer trust, cybersecurity initiatives give a high value for investment (ROI) despite
requiring substantial resources.
Developing Trust
Effective cybersecurity procedures show a company's attention to data responsibility. Earning
the trust of clients, partners, and officials can result in financial benefits like increased
business prospects and maintaining customers.
About Organizations
Businesses can use the framework as a path for combining cybersecurity with their financial
and environmental objectives. In Commercial Bank of Ceylon can create strategies that
maximize the use of resources, improve regulation, and create long-term financial stability by
comprehending these interrelated relationships.
For Policymakers
The concept can be used by policymakers to create rules that achieve a balance between the
necessity of data innovation and the importance of responsible and financial actions. It shows
how supportive laws and regulations promote suitable data management.
For Researchers
The standard framework provides a starting point for qualitative research, helping scholars in
examining specific elements of cyber security’s impact on responsible and financial results. It
also points up areas that need more research, such the return on investment of cybersecurity
in different business sectors
An organized method for understanding the interaction between these crucial elements is
offered by the conceptual framework used for evaluating the influence of cybersecurity on
the responsible and financial implications of big data analytics in Commercial Bank. This
model highlights the importance of an integrated approach to big data system management by
looking at the ways in which cybersecurity affects responsible data management and financial
results while taking into account the limiting impacts of external issues.
It shows how crucial it is to match cybersecurity with business goals, values, and financial
limitations in order to develop safe, reliable, and sustainable big data environments in the
bank. In the age of big data, this framework is a useful tool for researchers, companies, and
leaders to understand the complicated world of cybersecurity.
METHODOLOGY
The set of ideas about the proper methods for collecting, analyzing, and applying data in a
study is known as research philosophy. The research viewpoint aids in defining the
methodology used in this study to examine the connections between cybersecurity,
responsible, and financial effects in big data analytics in Commercial Bank of Ceylon.
Onion method.
A structured technique for creating a research framework is offered by the Onion Model in
research philosophy, which originally was offered by Saunders et al. in 2006. It layers
methodological and philosophical choices, starting with general paradigms and focusing on
specific approaches. It provides that every stage of the research process is methodically
executed, resulting in a technique that is logical and well-supported. This approach is very
useful for examining how cybersecurity affects the ethical and financial effects of big data
analytics as it helps researchers to thoroughly examine methodological decisions,
philosophical foundations, and useful methods.
The Onion Method can be used in the following ways to analyze the impact of cybersecurity
on responsible and financial effects of big data analytics project in Commercial Bank of
Ceylon:
I. Research Philosophy
The research's philosophical foundations are represented by the highest level of the
Research Onion. This framework directs the way one views and interpretation of
knowledge. The main areas of thought to take into consideration are:
Critical Realism: analyzes root causes and mechanisms, such as how laws and
regulations affect the application of cybersecurity.
Pragmatism is maybe the best choice for this research because it allows for a range of
approaches to examine the responsible and financial elements in a full way.
While creative components can be used to reveal knowledge about financial problems, a
deductive strategy is suitable for testing hypotheses about the impact of cybersecurity.
Mixed methods are best for a balanced understanding. For example, qualitative approaches
may explore the subtleties of financial data management, while quantitative research can
quantify the financial effects
This layer works on choosing a plan to carry out the investigation. Among the choices
are:
Case Studies: Perfect for delving closely into the cybersecurity procedures of
specific companies.
A case study methodology, enhanced by interviews or surveys, would offer this study
broadness as well as depth
V. Time Horizons
Given how big data analytics and cybersecurity are developing, an ongoing study may
provide deeper insights but would cost more. If time and finances are limited, a cross-
sectional research might but provide helpful data
The most complex level involves choosing certain methods for collecting and analyzing
data. Some the choices are:
Data analysis: methods include theme analysis for qualitative data and
methods of statistical analysis for quantitative data.
Financial data and qualitative replies can be analyzed for this study using methods like
theme categorization and statistical analysis, etc.
The reasoned strategy and methodological tactics used to approach the study objectives are
described in the research methodology. The technological, organizational, responsible, and
financial aspects of cybersecurity must be balanced while researching the responsible and
financial impacts of big data analytics in a commercial banking environment such as the
Commercial Bank of Ceylon. A clear research strategy guarantees methodical investigation
and evaluation of the subject. The following methodology is suggested for researching how
cybersecurity affects the responsible and financial outcomes of big data analytics at
Commercial Bank of Ceylon:
Choosing between quantitative, qualitative, or mixed methods can often be part of the study
design:
Operational data proving how cybersecurity events or data breaches affect the financial
indicators.
Analysis of Statistics:
Regression, also analysis is utilized for analyzing correlations between data such as
customer retention and cybersecurity spending.
Advantages
behavior among people, and financial issues. It is ideal for researching complex topics
like responsible for data and cybersecurity trust.
Set up focus groups to get a range of ideas on ethics and data security.
Methods of Analysis:
To find common themes in the experiences and attitudes of stakeholders, apply thematic
analysis.
Develop new ideas on the bank's cybersecurity procedures using fundamental concepts
Advantages
Captures deep, broad knowledge of the financial and responsible facets
of cybersecurity.
Provide a contextual awareness of the difficulties and driving forces
behind financial choices.
Gives freedom to investigate new ideas
Mixed Method: The mixed methods approach makes use of both quantitative and
qualitative methods to maximize each of them advantages.
To analyze themes and guide the design of quantitative surveys, begin with qualitative
approaches.
Quantitative analysis should be performed to evaluate the importance of the patterns found.
Concurrent Method:
To triangulate results, concurrently gather qualitative and quantitative data.
Integration of Data:
Combine lessons from personal accounts and numerical data using structures
Advantages.
Provides an in-depth analysis of how cybersecurity affects
responsibility and financial elements.
The Mixed Methods Approach mixes qualitative and quantitative approaches to analyze
intricate research issues in a comprehensive way. This method is ideal for research on how
cybersecurity affects the responsible and financial impacts of big data analytics at
Commercial Bank of Ceylon. It provides an accurate understanding of both quantifiable
financial results and the complex ethical issues related to big data use and cybersecurity.
1) Investigating Qualitatively
To fully understand the operational and ethical difficulties, gather qualitative information
through focus groups, interviews, and document reviews.
Find common themes, such as striking a balance between moral responsibility and financial
effectiveness.
Use the results to guide the creation of frameworks for data analysis or quantitative surveys.
Verify qualitative findings, such as the connection between cybersecurity and consumer trust,
by using structured surveys.
Excellent Knowledge
Includes intangible elements (like legal concerns) as well as quantifiable effects (like
financial results).
Improved Reliability
Reduces reservations and increases reliability by cross-verifying results from several sources.
Useful Information
Offers detailed, evidence-based suggestions for striking a balance between
responsible behavior and financial efficiency.
Engagement of Stakeholders
Makes sure different viewpoints are taken into account, which makes the results more
applicable to more types of stakeholders.
Conclusion
The best way for analyzing how cybersecurity affects the responsible and financial impacts of
big data analytics at Commercial Bank of Ceylon is the mixed methods approach. This
method offers an extensive overview of cyber security’s role in attaining both financial
efficiency and ethical responsibility by combining scientific precision with qualitative depth.
In a world where data is becoming more and more important, it provides results that are
specific to the bank's requirements, helping it in finding a balance between profits, trust, and
regulation.
The research strategy is an organized plan that specifies how the goals of the research will be
achieved. It provides that the research issue is effectively addressed by offering a defined
road map for data collection, analysis, and interpretation. Several research techniques can be
used to address the different facets of the issue for the project Analyzing the Impact of
Cybersecurity on Responsible and Financial Effects of Big Data Analytics at the Commercial
Bank of Ceylon. The following research study methods are suitable given the topic's nature,
which mixes cybersecurity, financial performance, and responsible data methods:
The goal is to learn more about the unresolved issues surrounding the banking
industry's use of big data analytics and cybersecurity, with a special focus on
areas with little or no study.
Application: The results of this approach may point to unexplored areas, such
as how cybersecurity affects consumer perceptions, respect to the law, or
creative financial models in big data systems.
The goal is to analyze, with establishing cause and effect, the connection between
two or more variables (for example, the efficacy of cybersecurity measures and the
bank's financial performance).
Focus: Analyzing the effects of the bank's use of cybersecurity measures on its
financial results and responsible data practices by looking at particular cases.
Application: This method enables a thorough, in-depth examination of the real cases,
providing in-depth knowledge of the bank's procedures and outcomes. As an example,
it may look at how a new cybersecurity strategy or data breach affected the bank's
financial performance, regulatory compliance, and consumer trust.
Techniques:
Qualitative: Interviews and case studies to comprehend the problems with consumer
trust, financial challenges, and responsible data management put on by procedures for
cybersecurity.
Application: By using this method, the study would be able to provide deeper insights
into the reasons for, difficulties with, and results of cybersecurity and big data
analytics at the bank by solving both the "how much" (quantitative) and "why"
(qualitative) problems.
Conclusion
A complete assessment of the responsible and financial effects of cybersecurity in big data
analytics is made possible by this study strategy, which blends the advantages of quantitative
and qualitative methodologies. A range of approaches might be used to examine how
cybersecurity affects the responsible and financial outcomes of big data analytics at
Commercial Bank of Ceylon, but the most suitable ones include case study, descriptive,
exploratory, explanatory, and mixed methods. The researchers would be able to provide
actionable insights and a thorough grasp of the complex nature of cybersecurity in banking by
using these methods to explain the current state of issues, investigate new viewpoints,
develop causal relationships, and give a thorough case-based analysis of the operations of the
bank.
The word "research choice" means the choice to answer a research question or aim using a
certain research methodology or design. It requires choosing the most effective strategy or
procedures for collecting and evaluating data in order to successfully achieve the study's
objectives. Numerous research approaches, including multiple-, combined-, and mono-
method techniques, are available to research.
Making the right research strategy is important for verifying that the study offers complete,
useful, and reliable data. Choosing between quantitative, qualitative, or mixed methodologies
techniques is part of the research for the Commercial Bank of Ceylon project "Analyzing the
Impact of Cybersecurity on Responsible and Financial Effects of Big Data Analytics." Given
the project's multiple character, a mixed methods strategy is strongly suggested
The project analyzes how cybersecurity, financial performance, and responsible big data
analytics techniques connect. This includes:
Stage of Quantification:
Examine past patterns in customer retention rates before to and following cybersecurity
improvements.
Stage of Qualitative:
To learn more about the challenges of integrating cybersecurity into big data platforms,
interview IT administrators.
Examine consumer reviews to learn about legal concerns with data processing and trust
levels.
Interdisciplinary importance:
This method takes into account the study's financial, responsible, and technological aspects.
It provides that human impressions and quantifiable results are taken into account.
Flexibility:
As new information becomes available during the study, researchers might modify the
strategy.
Enhanced Validation
Results from both methods are triangulated to improve the findings' precision and reliability.
The two methods' conflicting findings may reveal new areas of study.
The best research strategy for examining how cybersecurity affects the responsible and
financial results of big data analytics at the Commercial Bank of Ceylon is the Mixed
Methods Strategy. This method explores the moral and responsible action related to the use
of big data in while also guaranteeing an extensive understanding of the financial
implications. This research decision will yield useful findings that are in line with the bank's
operational objectives, client trust, and regulatory needs by fusing quantitative rigor with
qualitative detail.
The most important stage in the study process is collecting data, particularly for a project that
analyzes how cybersecurity affects responsibility and financial components of a banking
organization. In the framework of the Commercial Bank of Ceylon, the research project
"Analyzing the Impact of Cybersecurity on Responsible and Financial Effects of Big Data
Analytics" uses a methodical strategy to collect both quantitative and qualitative data. These
processes were created to provide complete, reliable, and dependable understanding of how
cybersecurity affects responsible and financial performance.
The following detailed methods for collecting data are suggested for the Commercial Bank of
Ceylon:
Data will be collected from many primary and secondary sources to make sure an extensive
analysis:
Case studies and published works on cybersecurity and big data analytics.
When analyzing the monetary effects and quantifiable results related to cybersecurity big data
analytics, quantitative data is crucial. Among the steps are:
Designed for bank workers in order to collect data on financial ramifications, perceived
cybersecurity threats, and the efficacy of created solutions.
With responses questions are used in surveys to help with quantitative analysis.
Centered on cybersecurity budget allocation and how it impacts financial success metrics.
Analyzes the financial impact of cybersecurity incident prevention, frequency, and severity.
Interviews:
Formal to informal interviews with top executives, legal officials, and IT managers.
Focus Groups:
Exploring issues and best practices with a variety of stakeholders, such as the operations,
finance, and IT departments.
Examines compliance with legal standards, including orders from the Commercial Bank.
Data can be grouped according to a number of criteria in the context of examining how
cybersecurity affects the ethical and financial effects of big data analytics. An outline of the
several kinds of data that might be used for the research is provided as follows:
1. Primary Data.
For the specific objective of the research, the primary data is collected direct from the
original sources. Through personal interviews with workers at the Commercial Bank of
Ceylon and other relevant sources, primary data for this project will be collected.
Quantitative Data
Since this kind of data is numerical, techniques from statistics may be applied to examine it.
It is often used to evaluate the quantifiable results, performance, and financial effect
connected to big data analytics and cybersecurity.
For example:
Qualitative Data
This kind of data is informal and visual. It provides background information, ideas, and an
extensive understanding of actions, views, and opinions.
For example:
Information into the bank's cybersecurity strategy collected from top management
interviews.
Focus group responses about acceptable data use and how it affects consumer trust.
Findings from compliance checks or cybersecurity audits.
2. Secondary Data.
Information that was already collected, examined, and released for different reasons but is
pertinent to the current study is referred to as secondary data. Secondary data might offer
standards, historical background, or different perspectives on the effects of cybersecurity.
Financial Documents:
Data from the bank's prior financial reports, including annual reports, cybersecurity financial
spaces, and reports describing monetary losses brought on by data breaches or cyber threats.
For example:
For example:
Releases and studies from other institutions, think tanks, or organizations that provide
information about the wide effects of cybersecurity on financial results and responsibility.
For example:
A key stage in any research process is data collecting, which provides the capture of precise
and pertinent information for achieving the goals of the research. In the frame of big data
analytics, efficient collection of data is the key to fully understand the effects of cybersecurity
on responsibility and financial effects. The Commercial Bank of Ceylon is using a mixed-
methods approach to collect data for this project, using quantitative and qualitative Data
collection methods. For sure a complete understanding of the topic, this method combine
both qualitative and quantitative methods.
The goal of the quantitative data collecting method is to collect identifiable, numerical data
that can be analyzed using statistics so as to evaluate the operational and financial effects of
cybersecurity.
Questionnaires
Goal: To compile information on consumer satisfaction, perceptions, and trust in the bank's
cybersecurity procedures.
Respondents: Clients of banks who use digital services like mobile applications or internet
banking.
Method: Organized surveys that were sent by SMS, email, or hard copy at bank locations.
With responses questions to measure degrees of satisfaction and trust.
Questions on knowledge of cybersecurity threats and how they affect service use.
The goal is to get firsthand feedback from customers on how to deal with cybersecurity-
related problems, such as scam efforts or data breaches.
Distribution Channels: Customer portals with online forms incorporated. Workers' feedback
devices.
The goal of the qualitative data collecting approach is to collect complete, descriptive
information in order to analyze the subjective characteristics of cyber security’s influence on
responsible and financial behavior.
Goal: To learn more about the viewpoints of the bank's stakeholders. Members include
professionals in cybersecurity and IT managers.
Method: Using open-ended questions, investigate the difficulties, methods, and choices that
go into cybersecurity projects.
Analysis of Documents
Goal: To assess the bank's cybersecurity and data analytics regulations, compliance
frameworks, and reports of audit.
Documentation showing regulatory compliance such as the GDPR and Sri Lanka's Personal
Data Protection Act.
This project's methods for collecting data combine qualitative and quantitative precision to
examine how cybersecurity affects the Commercial Bank of Ceylon's financial and
responsible results. The research provides a thorough grasp of how cybersecurity improves
responsible and financial performance in the context of big data analytics by combining a
variety of data sources, including financial records, IT evaluations, surveys, interviews, and
document analysis. Because these techniques adhere to moral and legal requirements, the
results are accurate and useful.
Surveys
One of the main methods for gathering quantitative data from bank staff and clients is the use
of surveys. They are employed to evaluate opinions, contentment, and confidence in
cybersecurity procedures.
Tools Used:
Survey Monkey, Microsoft Forms, or Google Forms: These online resources are easy
to use and help with distribution, as well as primarily by SMS and email.
Mobile Apps: Survey response rates can be improved by including them into the
bank's current mobile app platform.
Paper Surveys: Paper-based surveys are given out at bank locations to clients who
want simpler methods.
Analysis of Documents
Analyzing both external and internal documents pertaining to the bank's cybersecurity
procedures provides useful data.
Tools used:
Adobe Acrobat Readers & Analyzers: For examining and analyzing audit papers,
compliance reports, and regulations.
Knowledge management platforms are internal systems that the bank uses to keep
operational and legal records
In order to understand the data collected, identify important patterns, and make inferences,
data analysis tools are important. For this research, both quantitative and qualitative analytic
methods are used.
The goal of quantitative data analysis is to quantify relationships, trends, and impacts using
statistical and numerical tools.
Tools Used:
Interpreting qualitative data in order to identify themes, patterns, and findings is known as
qualitative data analysis.
Tools Used:
NVivo: is an effective tool for defining and examining qualitative data from
documents, focus groups, and interviews.
MAXQDA: Another tool for classifying and evaluating qualitative text data is
MAXQDA.
Thematic Analysis Frameworks: Methods for finding important themes in written
work that can be done manually or with the use of tools
1.16. Sampling
A key element of research technique is sampling, which is the process of choosing a specific
group of people, things, or documents from a broader population. By using this subset, or
sample, to draw conclusions about the population, the research is kept correct but being
feasible, cost-effective, and time-efficient.
Sampling Techniques.
Probability sampling and non-probability sampling are the two primary groups into which
sampling techniques fall. Each offers special benefits and use cases.
1. Probability sampling.
By providing that each individual in the population has a comparable possibility of being
chosen, probability sampling lowers unfairness and improves that they are representative.
Definition: Samples are selected proportionately from each group once the
population is divided up into subgroups (strata) based on specific
characteristics.
Application: Provides representation among client the population, including
age, income brackets, and financial service type (corporate or retail).
A hypothetical scenario would be to separate clients into age categories and
choose participants equally from each group.
Non-probability sampling, which is often used when unique or specialized data is needed,
entails choosing individuals according to specific requirements.
Definition: Participants are selected according to how well they fit the goals of the
study.
Application: Choosing staff members with financial management or cybersecurity
experience.
Interviewing compliance officers or IT managers who have personally worked with
the bank's cybersecurity tactics is one example.
Easy Sampling
In conclusion, the use of stratified sampling is a good fit for the complex responsible,
financial, and cybersecurity implications of big data analytics. It enables a focused and
methodical evaluation of numerous elements of the research topic, saving resources and
improving the reliability and relevance of the findings of the research.
Any research project must include a sampling strategy as it explains how participants will be
chosen to make sure that the data is representative and relevant to the goals of the research.
The goal of the research is to understand how cybersecurity affects the Commercial Bank of
Ceylon's financial results and responsible business practices. The stratified random selection
method was selected as the best strategy due to the selected population's complex and variety.
A reliable and systematic method for dividing the population into discrete subgroups, also
known based on common characteristics is the stratified sampling strategy. Because of the
wide range of stakeholders participating in the project "Analyzing the Impact of
Cybersecurity on Responsible and Financial Effects of Big Data Analytics in the Commercial
Bank of Ceylon," this method is specifically useful.
The following variables guided the selection of the stratified sampling method:
Diverse Population: The Commercial Bank of Ceylon serves a wide range of clients,
including corporate and retail clients, as well as personnel from different departments.
Accurate Representation: The sample captures the viewpoints of all pertinent subgroups by
stratifying according to important attributes (role, department, and client type).
When compared to ordinary random sampling, enhanced precision lowers sample bias and
boosts result dependability.
By focusing on relevance, the researcher may choose the most suitable people to get
understanding of how cybersecurity affects responsible and financial performance.
Improved Representativeness: Provides that the sample includes smaller but crucial
subgroups, such as compliance managers.
Increased Accuracy: By focusing on homogeneous groups, sampling error is
minimized.
The Commercial Bank of Ceylon's expanded population makes the stratified sample approach
the perfect choice for this study. The method provides representativeness, reduces bias, and
permits detailed analysis of subgroups by dividing the population into relevant strata and
sampling equally within each group. Finding useful information into how cybersecurity
affects the responsible and financial facets of big data analytics requires a planned strategy.
Customers, including corporate and retail clients, are examples of external stakeholders.
Level of Confidence:
A 95% confidence level is selected, which indicates that there is a 95% chance the findings
will correctly reflect the features of the population.
Error margin:
An appropriate degree of reliability is ensured with a ±5% margin of error.
For a finite population, the sample size (n) is determined using the formula below:
Where:
The most important step in research is participant selection, which defines the reliability and
representation of the data collected. The objective of the research is to collect views from a
wide range of stakeholders who are affected in some way by the bank's big data analytics and
cybersecurity procedures. One of the top banks in Sri Lanka, the Commercial Bank of Ceylon
has many different stakeholders, such as staff, management, and clients. To make sure an
accurate understanding of the bank's environment, the participants are selected from among
internal stakeholders (workers) and external stakeholders (customers).
Identifying Participants:
Internal Stakeholders: Identify workers using specified requirements by using the bank's HR
database.
External Stakeholders:
Segment consumers using the bank's customer relationship management (CRM) system.
Pay close attention to current clients who have used digital services in the year before.
Ethical Consideration
Informed Consent: the participants get information about the research's goals, their
rights, and the intended use of their data. Before participation, written or online
consent is collected.
Fair Selection: Participants are chosen without exclusion, promoting inclusion and
balance.
Detailed Representation
By collect both employees and customers, the research is sure to include both internal and
externally points of view, improving the analysis.
Consumers comment on how the bank's cybersecurity efforts have affected their levels of
satisfaction and trust.
Realistic Possibility
The plan provides a feasible just exact approach by conforming to schedules, ethical
standards, and available resources.
The research's participant selection process has been carefully planned out for equal
treatment, inclusiveness, and connection with the goals of the research. The research provides
complete and representative collection of data by integrating internal stakeholders (workers)
and external stakeholders (customers) and using a stratified random sample procedure. The
participant selection process's trust is further supported by ethical concerns, flexibility, and
practical tests, which provide a solid basis for examining how cybersecurity affects the
Commercial Bank of Ceylon's financial and responsible effects.
GANTT CHART.
REFERENCES