1BoinapallyApplication.docx
Principal Investigator: |
Prem chander Boinapally |
Study: |
Adult and Continuing Education and Teaching |
APPLICATION FOR APPROVAL OF RESEARCH
Institutional Review Board
Principal Investigator
1. Principal Investigator:
a. Full name: |
Prem chander Boinapally |
|
b. University department, program, and position: |
Education/Student |
|
c. Email address: |
||
d. Phone number: |
510-556-7011 |
b. Co-Principal Investigator (if applicable):
a. Full name: |
||
b. University department, program, and position: |
||
c. Email address: |
||
d. Phone number: |
c. Person completing this application (if not PI):
a. Full name: |
|
b. Email address: |
|
c. Phone number: |
d. If the PI is a student, the supervising professor or academic advisor:
a. Full name: |
Dr. Olabisi Adenekan |
b. Email address: |
|
c. Phone number: |
e. Has this study been approved by a committee?
f. |
Yes |
X |
No |
5. Submission Category (please check one):
Exempt – no human subjects involved |
X |
Expedite – minimal risk to human subjects |
Full Review – moderate to high risk to human subjects |
6. Publication Audience:
Internal – research intended for teaching purposes only within courses at Judson University. |
X |
Public – research may be published outside of Judson University. |
Research Study Identification and Overview
1. Title of study:
Cyber Security |
2. Full description of the research, its objectives, methods, and what subjects will be asked to do.
Our dependency on the internet has become immense. It is wrong to assume one’s safety in the sense that only big organizations are more susceptible to hackers. A normal consumer connected to the internet if not vigilant enough is at the risk of getting trapped easily. Cyber infiltrators have developed many ways of hacking into systems. In this day and era, cyber security helps maintain order, and keep the internet safe for users. The current digital era has influenced change in the ways we buy things, bills get paid, watch movies, how people pay mortgages and rent houses just to mention but a few. Incidents of security breaches are widely reported as well as fraud, malicious cyber-attacks, fraud, hacking, cyber-bullying making it necessary for the need of cyber security. This research will use the qualitative research method. Data will be collected and analyzed. Non-numerical data will be used to help gather deeper insights into the problem to help generate new ideas. The intention is to investigate cyber security and find out possible measures put in place to be secure against threats, investigate the measures organization put in place and adopt for safety, and to find out what measures individuals and organizations should take to protect themselves. Subjects will be chosen base on the research need rather than convenience. Participants were selected based on searches on the web through posting on social media of the survey targeted towards victims of cyber-attacks. Blogs and posts aimed were p for victims of cyber attacks were published inviting them for the survey. Victims for the survey will qualify on merit that they received a malicious malware either through a trojan or an executable file performing an action on the victim’s machine or on the network. The method by which the attacker sent the malware will also be considered either by e-mail, as an attachment or as a link that will download the payload. Another factor will be to consider what exploitation the victim faced and where the attacker needs the aim of the victim. Further we will question whether the victims installation of the malware was successful and if the victim did execute it automatically and whether the attacker achieved his objectives where there was loss of data from the database through the web server. |
3. Dates for conducting study:
This study will take place between February and July 2022. General logistics; survey distribution, identifying participants will take place between February and March 2022. Focus group meeting will be done between April and May 2022. Transcription and coding will be done between April and July 2022. |
4. Site(s) of study:
The data to be collected will be collected from the following geographical areas: · Washington D.C area location. · Colorado Springs area location. · Albuquerque area location. · New York area location |
5. Description of the population/subjects participating in the research study, recruitment of the subjects, and the criteria for inclusion as a participant of the study.
The participants for this study will be adults of 18 years and above and categorized as either an expert or a victim. The involvement selection process will be based on availability and willingness of the participants. A follow up survey will be conducted to people available and willing to participate in the research. Participant for this research study will be drawn from the mentioned geographical place above. Washington D.C will get higher popularity than the rest. Participants will be of mixed ages and gender. Participants who are victims take precedence as they provide insights of value to the research topic. For easier communication, participants will be able to converse in English. Participants will be of 5-7 participants who will be categorized by the geographical region they are in. |
6. Identification of special subjects/ populations, if any, such as children and minors, pregnant women, cognitively-impaired persons, prisoners, traumatized and comatose patients, terminally ill persons, elderly, minorities.
The research will be open to all adults except adults with mental dis-abilities. Adults with physical dis-abilities are eligible for the research. Most people with this disability are restricted in carrying out activity such as self-care, mobility or communication which present as an obstacle for the research. A test will be administered in order to filter out people with short attention spans, poor reading writing and communication ability, disorganization and other sensory difficulties, eye-hand coordination problems and poor coordination overall, difficulty with sequencing, and lastly poor memory. |
7. Full description of provisions to care for subjects where there is risk of physical or emotional research-related harm.
When interviewing the victims, I’ll make sure they are in a safe space physically and psychologically to talk about how cyber security breach affected them. |
8. Description of confidentiality provisions and measures to protect the identity and privacy of subjects.
Any information given by participants is confidential and he or she won’t be exposed. Both during and after research anonymity is paramount and will be guaranteed. Hard copies and electronic ways will be used to store data. The audios will be transcribed by the researcher and the hard copies locked away in the cabinet. Only the research team will have access. |
9. Description of obtaining consent from subjects and, if the subjects are minors, obtaining consent from the child’s legal guardian.
Any participating adult will be asked to sign a consent form before the commencement of a survey. |
10. Risk Assessment scores (taken from the Risk Assessment form).
No Risk: 2 Minimum Risk: 4 Moderate Risk: 6 High Risk: 2 |
As principal investigator, I assure that the information provided is correct, that I will seek Judson University IRB approval for any substantive modifications in the research study, and that I will report to the IRB Chair promptly any incidents or anticipated problems that may occur during the course of the study that may affect subjects adversely or change the risks and benefits described.
Signature of principal investigator: Prem chander
Date of signature: 03/09/2022
If the PI is a student:
Signature of supervising professor:
Date of signature: March 11, 2022
This study has been approved by Judson University’s Institutional Review Board.
Signature of IRB Chair ___________________________________
Date of signature ______________________________
1
2
You can place an order similar to this with us. You are assured of an authentic custom paper delivered within the given deadline besides our 24/7 customer support all through.
Latest completed orders:
# | topic title | discipline | academic level | pages | delivered |
---|---|---|---|---|---|
6
|
Writer's choice
|
Business
|
University
|
2
|
1 hour 32 min
|
7
|
Wise Approach to
|
Philosophy
|
College
|
2
|
2 hours 19 min
|
8
|
1980's and 1990
|
History
|
College
|
3
|
2 hours 20 min
|
9
|
pick the best topic
|
Finance
|
School
|
2
|
2 hours 27 min
|
10
|
finance for leisure
|
Finance
|
University
|
12
|
2 hours 36 min
|