Journal of Information Security

Volume 3, Issue 3 (July 2012)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.25  Citations  

The Application of Mixed Method in Developing a Cyber Terrorism Framework

HTML  XML Download Download as PDF (Size: 70KB)  PP. 209-214  
DOI: 10.4236/jis.2012.33026    7,955 Downloads   14,021 Views  Citations

ABSTRACT

Mixed method research has becoming an increasingly popular approach in the discipline of sociology, psychology, education, health science and social science. The purpose of this paper is to describe the application of mixed method in developing a cyber terrorism framework. This project has two primary goals: firstly is to discover the theory and then develop a conceptual framework that describes the phenomena, and secondly is to verify the conceptual framework that describes the phenomena. In order to achieve conclusive findings of the study, a mixed method research is recommended: qualitative data and quantitative data are collected and analyzed respectively in a separate phase. The mixed method approach improves the rigor and explanation of the research results, thus bring conclusive findings to the study outcome. By utilizing qualitative and quantitative techniques within the same study, we are able to incorporate the strength of both methodologies and fit together the insights into a workable solution.

Share and Cite:

R. Ahmad and Z. Yunos, "The Application of Mixed Method in Developing a Cyber Terrorism Framework," Journal of Information Security, Vol. 3 No. 3, 2012, pp. 209-214. doi: 10.4236/jis.2012.33026.

Cited by

[1] THE IMPORTANCE OF MIXED METHOD IN TERRORISM STUDY
International Journal of Social And Humanities …, 2023
[2] 42 Methoden der Terrorismusforschung: Ein Überblick
Terrorismusforschung, 2022
[3] Terrorism and Social Media: Extremist Groups and College Student Recruitment
2021
[4] Artificial Intelligence Cybersecurity Threats: Determining Strategy and Decision-Making Effects
2020
[5] A Mixed-Methods Research design for study of possible futures for South Africa's transition to a low carbon economy.
2020
[6] Representations of the threat of cyberterrorism in the UAE's Arabic and English-language news media
2019
[7] Security Technology and Awareness Training; Do They Affect Behaviors and Thus Reduce Breaches?
2019
[8] The evolution of deterrence theory for a new dimension The challenges of cyber deterrence strategies in international system
2019
[9] Cashing in on Cyberpower: How Interdependent Actors Seek Economic Outcomes in a Digital World
2018
[10] EFFECT OF MOBILE BANKING ADOPTION ON THE PERFORMANCE OF SMALL AND MEDIUM ENTERPRISES IN NAIROBI COUNTY
International Journal of Economics, Business and Management Research, 2018
[11] Estudos prospectivos sobre o ciber terrorismo na Paraíba
2018
[12] The Threats of Cyber Warfare in the Sadc Region: The Case of Zimbabwe
2017
[13] THE CRIME-TERROR NEXUS: IMPROVISED EXPLOSIVE DEVICE ILLICIT SUPPLY INTERMEDIATION
2017
[14] Understanding Cyber Terrorism from Motivational Perspectives: A Qualitative Data Analysis
2017
[15] Cyber-Security Policy Decisions in Small Businesses
Walden Dissertations and Doctoral Studies, 2017
[16] Examining the Negative Impact of Information Security on Worker Performance
ProQuest Dissertations Publishing, 2017
[17] Organizational Decisions about Cyber Security in Small to Mid-Sized Businesses: A Qualitative Study
ProQuest Dissertations Publishing, 2016
[18] Law Enforcement Leadership Training Strategies
Walden Dissertations and Doctoral Studies, 2016
[19] Law Enforcement Employees' Experiences of Skillful Recognition by Leaders
Walden Dissertations and Doctoral Studies, 2016
[20] The Relationship Between Terrorism, Oil Prices, and Airline Profitability
Walden Dissertations and Doctoral Studies, 2015
[21] The implementation of mixed method in developing a mobile learners security framework
Computational Science and Technology (ICCST), 2014 International Conference on, 2014
[22] Adoption of Mobile Payments in Kenyan Businesses: A case study of Small and Medium Enterprises (SME) in Kenya
International Journal of Computer Applications, 2014
[23] Grounding the component of cyber terrorism framework using the grounded theory
Science and Information Conference (SAI), 2014. IEEE, 2014
[24] The Application of Qualitative Method in Developing a Cyber Terrorism Framework
RECENT ADVANCES in ECONOMICS, MANAGEMENT and DEVELOPMENT, 2014

Copyright © 2025 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.