Nature of the Study The qualitative method will be appropriate for this study because it involves an understanding the motivation, reasons, and opinions of real-life situations. The qualitative method also provides insights into the problem from the perspective of the participant to develop ideas from significant events to explore contemporary issues to find answers to questions (Park & Park, 2016). More specifically, I determined that the qualitative method would be most appropriate for this study because I intended to explore strategies owners of small businesses use to protect their business data from cyber-attacks. Other methods that were reviewed are quantitative and mixed methods. Quantitative analyses are used for hypothesis testing …show more content…
The ethnographic design would not be suitable for this study because the goal of my research is not to understand the cultural practices of a specific group that wants to create, perceive, and navigates the social world. Furthermore, the phenomenological design would not be appropriate for this study since the goal of my research is not to explore lived experiences; researchers use phenomenological design to observe the meaning of lived experiences of a group people or an individual that relates to a unique phenomenon (Mayoh & Onwuegbuzie, 2015). I will not be using a narrative research design because its approach is on the story, typically both how and what is narrated. The multi-case design would be appropriate for this qualitative study because I would use multiple forms of data collection to systemically gather data from different small business owners on how they have strategically protected their business data from …show more content…
What successfully risk management strategies have you identify to evaluate cyber attack risks? 6. What is your contingency plan in the event of a cyber-attack? 7. What key strategies would you like to recommend to other SME owners that would help to prevent a cyber attack? 8. What other strategies, not covered in this interview, you would like share that might be beneficial to other SME owners? Conceptual Framework Vigilantism can be discussed as conceptual. I selected Cyber-Vigilantism as the conceptual framework for this study. Johnson (1996) offered the most detailed criminological definition of vigilantism as a social crusade that gives rise to planned acts of force or susceptible force by independent citizens. This concept is at the root of most vigilantism studies and continues to be valuable to this date. Vigilantism arises as individuals and or group response that breaks through norms. Also, vigilantes would often seek to offer social control, crime control, and a security guarantee for themselves and others they try to serve (Silva,