OtherPapers.com - Other Term Papers and Free Essays
Search

Anti-Virus Software Program Free Proposal

Essay by   •  September 25, 2011  •  Business Plan  •  8,317 Words (34 Pages)  •  1,525 Views

Essay Preview: Anti-Virus Software Program Free Proposal

Report this essay
Page 1 of 34

TABLE OF CONTENTS

TABLE OF CONTENTS i

LIST OF ABREVIATIONS ii

KEY DEFINITIONS iii

CHAPTER ONE

1.0 EXECUTIVE SUMMARY. 1

1.1 INTRODUCTION AND BACKGROUND OF THE PROBLEM. 2

1.2 STATEMENT OF THE PROBLEM 3

1.3 RESEARCH QUESTIONS 4

1.4 OBJECTIVES OF THE STUDY 4

1.5 SIGNIFICANCE OF THE STUDY 5

1.6 SCOPE OF THE STUDY. 5

1.7 LIMITATION OF THE STUDY. 6

CHAPTER TWO

2.0 LITERATURE REVIEW 7

2.1 THEORETICAL STUDIES 7

2.2 EMPIRICAL REVIEW 15

CHAPTER THREE

3.0 RESEARCH METHODOLOGY 18

3.1 RESEARCH DESIGN 18

3.2 RESEARCH TECHNIQUE 18

3.3 UNIT OF ENQUIRY AND ANALYSIS 18

3.4 SAMPLE DESIGN 19

3.5 SAMPLE SIZE 19

3.6 DATA COLLECTION METHODS 20

3.7 TYPES OF DATA 21

CHAPTER FOUR

4.0 ANNEXES 22

4.1 BUDGET 22

4.2 SHEDULE OF ACTIVITIES 23

4.3 BIBLIOGRAPHY/SELECTED REFERENCES 24

OUESTIONNAIRE 26

INTERVIEW QUESTIONS 32

LIST OF ABREVIATIONS

AUWSA................................. Arusha Urban Water Supply and Sewerage

Authority

ICT........................................ Information Communication Technology

IT.......................................... Information Technology

www............................................World Wide Web

KEY DEFINITIONS

Anti-virus software program: is a computer program that can be used to scan files to identify and eliminate computer viruses and other malicious software (malware).

Computer security is the effort to create a secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed.

Network firewall: is any device used to prevent outsiders from gaining access to your network.

Network security is the protection of networks and their services from unauthorized modification, destruction, or disclosure, and provision of assurance that the network performs its critical functions correctly and there are no harmful side-effects.

Primary data is the one that is original and is gathered for the first time and will be collected using interview, questionnaire and observation methods of data collection.

Qualitative techniques: These are research techniques that base on narrations and explanations.

Quantitative techniques: These are research techniques that base on numbers and calculations and use statistical measures.

Secondary data on the other hand is the kind of data that is collected from already written documents, books, websites and other sources.

Security software: Programs that are used to restrict access to the data and files on a computer. It can also be defined as software that protects an organization's sensitive and confidential data from accidental or intentional leaks.

CHAPTER ONE

1.0 EXECUTIVE SUMMARY.

In today's information technology, security issue is increasingly becoming very crucial and important in every business organization. These organizations need to make sure that their computers, networks and any records or data they keep are free from risk. Risks associated with information technology include destruction of organization's data or records by the use of malicious software, unauthorized access of organization's confidential information and improper use of networks and other resources. Different organizations use different security measures to keep them away from risk and among these security software is proving to be the best.

This study/research will investigate on "role of security software in business organization" and will be conducted at Arusha Urban Water Supply and Sewerage Authority (AUWSA) for almost 16 weeks effectively from 1st October 2007 to 31st January 2008. The main purpose of this study is to examine security issue in today's information technology especially in the use of security software. The study also aims at analyzing the awareness of people about risks associated with computers, networks and information technology in general.

The study will use both qualitative and quantitative techniques to conduct the research. Quantitative techniques base on numbers and calculations and will use statistical measures. Quantitative techniques are going to be used to provide necessary explanations on role of security software in business organizations.

Data collection methods that will be employed for the study include; interview, questionnaire, direct observations and document review. Interview, questionnaire and direct observation methods will be used to collect primary data whereas document review method will be used to collect secondary data for the study.

The estimated budget for this study runs to Shs.928800 of which 75% will be provided by the government (ministry of finance) and the remaining 25% is going to be financed by researcher himself.

1.1 INTRODUCTION AND BACKGROUND OF THE PROBLEM.

In many business organizations (both governmental and non-governmental),

...

...

Download as:   txt (49.6 Kb)   pdf (482.3 Kb)   docx (30.9 Kb)  
Continue for 33 more pages »
Only available on OtherPapers.com