HIRE WRITER

Scientific Method in Research of Cyberterrorism

This is FREE sample
This text is free, available online and used for guidance and inspiration. Need a 100% unique paper? Order a custom essay.
  • Any subject
  • Within the deadline
  • Without paying in advance
Get custom essay

In order to develop an informative and academically reliable report, the scientific method must be utilized. The use of the scientific method helps ensure the integrity and efficacy of research information and data (Cherry, 2019). Furthermore, the scientific method can provide a reliable platform on which information can be presented to superiors. The contemporary issue that will be used is cyberterrorism.

In order to produce a report for one’s chain of command, a research proposal must be drafted detailing what will be studied and how it will be done. In addition, a specific research objective or problem is usually included in a research proposal (Maxfield & Babbie, 2016). For example, a potential research proposal concerning cyberterrorism could entail a research objective to study the online behaviors of cyberterrorists. The first step consists of a Literature Review to determine what is known about the topic in academia and professional spheres and what aspects have yet to be studied (Cherry, 2019; Maxfield & Babbie, 2016).

For instance, a literature review would be conducted to determine what is known about cyberterrorist behaviors and identify potential questions about cyberterrorists that require more research. The second step necessitates the creation of a research question (Cherry, 2019). The research question should be based on information from the literature review and a hypothesis about the potential outcome to the research question should be presented (Maxfield & Babbie, 2016). For example, the following research question could be posed: “To what degree does technological expertise and skill influence the likelihood of a cyberterrorist launching attacks in cyberspace?”

A potential hypothesis might suggest that a correlation exists between the cyberterrorist’s skillset and the likelihood that they will commit future cyberattacks. The third step entails the testing of the hypothesis and collecting data (Cherry, 2019). A report should mention if and who the study participants are, how variables will be defined and measured in the study, the methods used to collect the data, the type of analysis that will be used to interpret the data, the referencing of all consulted/cited resources, a proposed schedule for the research, and a breakdown of how financial resources will be allocated during the research process (Maxfield & Babbie, 2016).

The fourth step then requires analyzing the results and deducing conclusions, to see if the study results support or refute the proposed hypothesis (Cherry, 2019). For instance, say the study results were analyzed and revealed that a correlation did not exist between a cyberterrorist’s skillset and the likelihood that they would engage in future cybercrime. The final step encompasses reporting the results and study methodology to academic and/or professional journals to permit other scientists to study, replicate, or investigate unanswered aspects of the topic (Cherry, 2019). For instance, because the hypothetical study on cyberterrorists revealed that there wasn’t a connection between skillset and probability of committing future cybercrime, other researchers may perform future research to learn more.

Utilizing the scientific method places additional responsibility and duties on the researcher to conduct research ethically, legally, and in a financially sound manner. In addition, transparency both during the research process to when the final results are published is vital (Maxfield & Babbie, 2016). Failing to produce ethically and legally sound research can have negative repercussions on one’s professional reputation and future career. In addition, if one’s research lacks transparency, the entire research project may be assessed with suspicion or disregarded altogether. Conversely, utilizing the scientific method correctly and within the bounds of ethics, the law, and transparency will help one produce valid research that will bolster one’s professional experience. Furthermore, the use of the scientific method helps elevate one’s research from causal exploration to professional status worthy of additional academic review and consideration (Maxfield & Babbie, 2016).

Cite this paper

Scientific Method in Research of Cyberterrorism. (2021, Aug 14). Retrieved from https://samploon.com/scientific-method-in-research-of-cyberterrorism/

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Hi!
Peter is on the line!

Don't settle for a cookie-cutter essay. Receive a tailored piece that meets your specific needs and requirements.

Check it out