The Application of Mixed Method in Developing a Cyber Terrorism Framework

Abstract

Mixed method research has becoming an increasingly popular approach in the discipline of sociology, psychology, education, health science and social science. The purpose of this paper is to describe the application of mixed method in developing a cyber terrorism framework. This project has two primary goals: firstly is to discover the theory and then develop a conceptual framework that describes the phenomena, and secondly is to verify the conceptual framework that describes the phenomena. In order to achieve conclusive findings of the study, a mixed method research is recommended: qualitative data and quantitative data are collected and analyzed respectively in a separate phase. The mixed method approach improves the rigor and explanation of the research results, thus bring conclusive findings to the study outcome. By utilizing qualitative and quantitative techniques within the same study, we are able to incorporate the strength of both methodologies and fit together the insights into a workable solution.

Share and Cite:

R. Ahmad and Z. Yunos, "The Application of Mixed Method in Developing a Cyber Terrorism Framework," Journal of Information Security, Vol. 3 No. 3, 2012, pp. 209-214. doi: 10.4236/jis.2012.33026.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] M. Crotty, “The Foundation of Social Research: Meaning and Perspective in the Research Process,” Allen and Unwin, St Leonards, 1998.
[2] D. Levy, “Qualitative Methodology and Grounded Theory in Property Research,” Pacific Rim Property Research Journal, Vol. 12, No. 4, 2006, pp. 369-388.
[3] J. M. Case and G. Light, “Emerging Methodologies in Engineering Education Research,” Journal of Engineering Education, Vol. 100, No. 1, 2011, pp. 186-210.
[4] D. A. Simanjuntak, H. P. Ipung and C. Lim, “Text Classification Techniques Used To Facilitate Cyber Terrorism Investigation,” Proceeding of Second International Conference on Advances in Computing, Control, and Telecommunication Technologies (ACT 2010), Jakarta, 2-3 December 2010, pp. 198-200. doi:10.1109/ACT.2010.40
[5] M. Dogrul, A. Aslan and E. Celik, “Developing an International Cooperation on Cyber Defense and Deterrence against Cyber Terrorism,” 3rd International Conference on Cyber Conflict, Tallinn, 7-10 June 2011, pp. 1-15.
[6] M. Conway, “Against Cyberterrorism,” Communications of the ACM, Vol. 54, No. 2, 2011, p. 26. doi:10.1145/1897816.1897829
[7] Z. Yunos, S. H. Suid, R. Ahmad and Z. Ismail, “Safeguarding Malaysia’s Critical National Information Infrastructure (CNII) against Cyber Terrorism: Towards Development of a Policy Framework,” IEEE Sixth International Conference on Information Assurance & Security, Atlanta, 23-25 August 2010, pp. 21-27.
[8] P. A. H. Williams, “Information Warfare: Time for a Redefinition,” Proceedings of the 11th Australian Information Warfare & Security Conference, Perth Western, 30 November-2 December 2010, pp. 37-44.
[9] C. Czosseck, R. Ottis and A. M. Taliharm, “Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security,” International Journal of Cyber Warfare and Terrorism, Vol. 1, No. 1, 2011, pp. 24-34. doi:10.4018/ijcwt.2011010103
[10] J. Matusitz, “Social Network Theory: A Comparative Analysis of the Jewish Revolt in Antiquity and the Cyber Terrorism Incident over Kosovo,” Information Security Journal: A Global Perspective, Vol. 20, No. 1, 2011, pp. 34-44.
[11] R. Ahmad and Z. Yunos, “A Dynamic Cyber Terrorism Framework,” International Journal of Computer Science and Information Security, Vol. 10, No. 2, 2012, pp. 149-158.
[12] M. Q. Paton, “Qualitative Evaluation and Research Methods,” 2nd Edition, SAGE Publications, Thousand Oaks, 1991.
[13] C. Yauch and H. Steudel, “Complementary Use of Qualitative and Quantitative Cultural Assessment Methods,” Organizational Research Methods, Vol. 6, No. 4, 2003, pp. 465-481. doi:10.1177/1094428103257362
[14] S. C. Currall, T. H. Hammer, L. S. Baggett and G. M. Doniger, “Combining Qualitative and Quantitative Methodologies to Study Group Processes: An Illustrative Study of a Corporate Board of Directors,” Organizational Research Methods, Vol. 2, No. 1, 1999, pp. 5-36. doi:10.1177/109442819921002
[15] K. J. Srnka and S. T. Koeszegi, “From Words to Numbers: How to Transform Qualitative Data into Meaningful Quantitative Results,” Schmalenbach Business Review, Vol. 59, No. 1, 2007, pp. 29-57.
[16] A. Bryman, “Integrating Quantitative and Qualitative Re- search: How Is It Done?” Qualitative Research, Vol. 6, No. 1, 2006, pp. 97-113.
[17] R. J. Chenail, “Conducting Qualitative Data Analysis: Qualitative Data Analysis as a Metaphoric Process,” The Qualitative Report, Vol. 17, No. 1, 2012, pp. 248-253.
[18] A. Tang, P. Avgeriou, A. Jansen, R. Capilla and M. Ali Babar, “A Comparative Study of Architecture Knowledge Management Tools,” Journal of Systems and Software, Vol. 83, No. 3, 2010, pp. 352-370. doi:10.1016/j.jss.2009.08.032
[19] R. Hoda, J. Noble and S. Marshall, “Using Grounded Theory to Study the Human Aspects of Software Engineering,” Proceeding of HAoSE 10 Human Aspects of Software Engineering, Nevada, 17-21 October 2010.
[20] A. A. Singh, A. Urbano, M. Haston and E. Mcmahan, “School Counselors’ Strategies for Social Justice Change: A Grounded Theory of What Works in the Real World,” American School Counselor Association, Vol. 13, No. 3, 2010, pp. 135-145.
[21] T. M. Egan, “Grounded Theory Research and Theory Building,” Advances in Developing Human Resources, Vol. 4, No. 3, 2002, pp. 277-295.
[22] M. Jones and I. Alony, “Guiding the Use of Grounded Theory in Doctoral Studies—An Example from the Australian Film Industry,” International Journal of Doctoral Studies, Vol. 6, 2011, pp. 95-114.
[23] J. Esteves, U. Politécnica and J. Carvalho, “Use of Grounded Theory in Information Systems Area: An Exploratory Analysis,” European Conference on Research Methodology for Business and Management, 2000, pp. 129-136.
[24] J. W. Creswell, “Qualitative Inquiry and Research Design: Choose among Five Traditions,” Sage Publications, London, 1998.
[25] J. M. Azorin and R. Cameron, “The Application of Mixed Methods in Organisational Research: A Literature Review,” Electronic Journal of Business Research Methods, Vol. 8, No. 2, 2010, pp. 95-105.
[26] G. Walsham, “Doing Interpretive Research,” European Journal of Information Systems, Vol. 15, No. 3, 2006, pp. 320-330. doi:10.1057/palgrave.ejis.3000589
[27] D. R. Cooper and P. S. Schindler, “Business Research Method,” McGraw-Hill Companies, Inc., New York, 2008.
[28] R. B. Johnson and A. J. Onwuegbuzie, “Mixed Methods Research: A Research Paradigm Whose Time Has Come,” Educational Research, Vol. 33, No. 7, 2004, pp. 14-26. doi:10.3102/0013189X033007014
[29] W. Olsen, “Triangulation in Social Research: Qualitative and Quantitative Methods Can Really Be Mixed,” In: M. Holborn, Ed., Development in Sociology, Causeway Press, Ormskirk, 2004, pp. 1-30.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.