You are on page 1of 4

Research Proposal

Amrit Magesh

Independent Research I G/T

2018-2019 School Year

Research Title: Mindlessly Trusting Technology: Cybersecurity in Developing Countries

Overview of Research

Each year, huge financial losses emerge and massive companies close down due to

cybercrime which has stagnated the economy and left personal information vulnerable to many

perpetrators. This research project encompasses the general understanding of cybersecurity in

developing countries. Specifically, the data will be adjusted to identifying initiatives and results

of cybersecurity in West African countries. Furthermore, the investigation will study if countries

from this select region are willing to accept aid from other developed countries such as the

United States. These areas of investigation will indicate how much the region values funding and

maintaining cybersecurity.

Background and History of Issue

Cybersecurity is the maintenance of hardware, internet-connected technology, software,

and data to shield unauthorized access. Cybersecurity has been historically misinterpreted in

many nations across the world; however, it has become more of an apparent need in the last two

decades due to the increase in technological output and usage. It is difficult to measure whether

or not developing countries are willing to contribute to this field, but recent complications

indicate so.
In recent years, many nations have found it to be unnecessary to publicly fund efforts to

diminish cyber attacks because they believe there are many other viable threats to their

respective infrastructures. For example, West African countries believe that addressing the

current HIV/AIDS epidemic may be more of a valid issue than funding cybersecurity.

Furthermore, the people of West African countries know next to nothing about cybersecurity.

They already face mass government corruption and voting scandals that make it difficult to

achieve any legislation they are passionate about in the first place. Fortunately, countries are

investing time in producing programs that can limit cybercrime; however, these initiatives lack

the power to effectively pursue and manage cybercriminals. Western Africa is not the only region

that experiences this problem: developing nations in Latin American constantly find a lack of

awareness preventing them from achieving a consensus.

Problem Statement and Rationale

Cybersecurity is an important issue because cybercrime results in huge economic loss for

a country. For the past couple of years, online data breaches have amounted to $600 billion

dollars in financial loss. That number seems to be only getting higher. Also, cybercrime is

appealing to many, especially unemployed young people, because of its high profit and relatively

easy access to harnessing data, hacking, spreading malware or spamming in developing nations.

Economic loss is not the only reason for cybersecurity’s importance. Personal data loss and

privacy can be breached as well. Some stakeholders in my research could be people willing to

find a job in the computer science field and people whose data can be breached. Cybersecurity

today finds a lot of unemployment which would be resolved if more countries spread awareness

about the field. Also, it would be a benefit for people already in the field. Last but not least, the
government itself could benefit from less economic wastage and efficiently run more

grants-in-aid.

Research Methodology

● Research Question: Do the costs outweigh the benefits for cybersecurity in developing

countries?

● Research Hypothesis: Awareness and government initiative for effective cybersecurity

in developing countries can be improved if there is more consensus through an

internationally funded and run protocol.

● Research Design: I will be conducting causal-comparative research. My research will be

conducted with qualitative data from data/document analysis of research articles and case

studies. To gather this data, I will observe recent attacks and analyze how a specific

country responds to cyber attacks. I will interview cybersecurity specialists and find their

opinion on the controversy in developing nations and what solutions they would favor.

Ultimately, I can predict the frequency of cybercrime in the West African region.

● Operational Definitions

○ Data Breaches - Tactics used to infiltrate others’ personal or financial data. This

can be heavily damaging to corporations or big businesses.

○ Cybercrime/Cybercriminal - It should be obvious what cybersecurity is based on

my background paragraph, but cybercrime and the profession of being a

cybercriminal is the idea that provokes cybersecurity. Cybercrime is the act of

committing data breaches or fraud, hacking, or phishing attacks.


○ Consensus- An international consensus signifies a collective response and

resolution from a variety of nations, developing or undeveloped, that benefits all

of them.

Product Overview

The outcome of the year of study is for the research to be presented in the Howard County

annual student learning conference this April at John Hopkins. The presentation will be

designated for incoming freshmen students interested to join the Independent Research or Intern

Mentor classes at their respective schools. The outlet vehicle, Google Slides, will be set up in

one of the classrooms at the center and the presentation can be delivered with or without the use

of props or pamphlets. The presenter will communicate his or her year of researching one topic

with the aid of visuals to enhance their speech. The audience will be able to assess the time,

effort, and interest of the individual delivering the presentation in order to understand the

capability of the independent research class.

Logical Considerations

One logical consideration when presenting the information about my project is equipment and

transportation to Johns Hopkins. I may construct a poster board, tri-fold board or need equipment

to help set up the online presentation. These limited special considerations can be resolved with

the help of the school providing transportation to John Hopkins and the center providing

presenting materials.

You might also like