Journal of Information Security
Vol.3 No.3(2012), Article ID:21342,6 pages DOI:10.4236/jis.2012.33026

The Application of Mixed Method in Developing a Cyber Terrorism Framework

Rabiah Ahmad, Zahri Yunos

Center for Advanced Computing Technology, Faculty of Information and Communication Technology, Universiti Teknikal Malaysia Melaka (UTeM), Melaka, Malaysia

Email: rabiah@utem.edu.my, zahri@cybersecurity.my

Received February 24, 2012; revised March 27, 2012; accepted April 26, 2012

Keywords: Mixed Method Research; Methodology; Data Analysis; Data Collection; Cyber Terrorism

ABSTRACT

Mixed method research has becoming an increasingly popular approach in the discipline of sociology, psychology, education, health science and social science. The purpose of this paper is to describe the application of mixed method in developing a cyber terrorism framework. This project has two primary goals: firstly is to discover the theory and then develop a conceptual framework that describes the phenomena, and secondly is to verify the conceptual framework that describes the phenomena. In order to achieve conclusive findings of the study, a mixed method research is recommended: qualitative data and quantitative data are collected and analyzed respectively in a separate phase. The mixed method approach improves the rigor and explanation of the research results, thus bring conclusive findings to the study outcome. By utilizing qualitative and quantitative techniques within the same study, we are able to incorporate the strength of both methodologies and fit together the insights into a workable solution.

1. Introduction

Methodology can be simplified as a plan of action where the method used brings to the desired outcome. The context of methodology as described by Crotty [1] cited in Levy [2], defines methodology as “the strategy, plan of action, process or design lying behind choice of particular methods and linking the choice and use of methods to the desired outcome”. Methodology refers to the theoretical arguments that researchers use in order to justify their research methods and design [3].

The purpose of this paper is to describe the application of mixed method in developing a cyber terrorism framework. This project has two primary goals, firstly is to discover a theory and then develop a conceptual framework that describes the phenomena by using qualitative method. Secondly is to verify the conceptual framework that describes the phenomena by quantitative method. By utilizing both techniques within the same study, the researcher is able to incorporate the strength of both methodologies and fit together the insights into a workable solution.

2. Literature Review

2.1. Cyber Terrorism

In this digital age, the concept of cyber terrorism or the use of cyberspace to carry out terrorist activities has emerged. The convergence of physical terrorism and new advancement of ICT have spawned a new term called cyber terrorism [4]. It can be summarized that cyber terrorism is the perpetration of attack through the cyberspace and the virtual world. However, there is no universally accepted definition of cyber terrorism, which seems to be a fundamental issue and challenge in countering threats from cyber terrorism.

At the international front and among the researchers, there is no common agreement on the concept of cyber terrorism [5-10]. While there are many definitions of cyber terrorism, these suggest a trend that in-depth analysis of this concept can be conducted. This can also be evidence that the study of this concept has been the focus of policy makers and scholarly studies, but their standpoints and views vary. Due to multidimensional structure (or components) of cyber terrorism, we can say that the concept of cyber terrorism is a contested concept whereby various parties interpret it differently.

The concept of cyber terrorism has several attributes (or components) such as motivation, impact and target [11]. Due to complexity of various interacting variables in the concept of cyber terrorism, to formulate a framework in describing its influential components would be beneficial. Therefore, accurate knowledge of the context of cyber terrorism enhances clarity and helps to avoid obscuring intent. Thus, there is a need for a more structured approach in understanding the various components of cyber terrorism. The outcome of this study serves the basis for various strategic decisions for policy and decision makers as well as useful foundation for academic research in understanding the context of cyber terrorism.

2.2. Mixed Method Research

One important way to strengthen a study design is through triangulation, or the combination of qualitative and quantitative approaches in the study of a situation or a certain phenomenon [12]. Usually, the researchers triangulate the two methods in order to check on the accuracy of the data gathered by each method, to make the choices available more concrete, to amplify strengths and lessen weaknesses in a study, and to answer broader and more complete range of research problems [13].

Currall et al. [14] study the use of qualitative and quantitative methods and conclude that the mixed methods promoted both theory development and theory evaluation (or verification). Srnka and Koeszegi [15] conclude that qualitative studies are accepted in the social sciences as exploratory or triangulation efforts that complement quantitative studies, which provide quality checks for each of these stages for result’s validity and reliability. A detailed study that examine the ways in which quantitative and qualitative research were integrated and combined in practice was conducted by Bryman [16]. He defines triangulation as traditional view where quantitative and qualitative researches are combined to triangulate findings in order to be mutually corroborated.

3. Knowledge Management Architecture in Developing Cyber Terrorism Framework

Knowledge management is a matter of managing analytical process to transform data into information, and information into knowledge, and knowledge into wisdom [17]. Recent research suggests that architectural knowledge, such as design decisions, is important and should be recorded alongside the architecture description [18]. In this research, the conceptual framework describing cyber terrorism is developed by using the grounded theory method. In grounded theory, the main source of data collection are interviews conducted with participants and observed by the researcher, whereby the researcher looks for common patterns among the sets of data [19]. Grounded theory is a rigorous process that involves generating a conceptual model (or theory) that is grounded in the data [20].

Egan [21] recommended five steps in the process of grounded theory research; initiating research, data selection, initiation and ongoing data collection, data analysis and concluding the research (Figure 1). Jones and Alony

Figure 1. Grounded theory process (adapted from Egan [21]).

[22] suggest five steps in grounded theory approach: acknowledgement of researchers’ bias, data selection, data collection, data coding & analysis and compilation of results. Likewise, the grounded theory method employed by Esteves et al. [23] composed of the following phases: research design phase, data collection phase, data analysis phase and comparison phase. Overall, the steps of grounded theory approach discussed above are more or less similar with each other. For this research, we adopted Egan’s recommendation.

The first level, initiation of the research involves the selection of an area of inquiry. The research begins with an awareness of the context of the research by reviewing literatures relevant to the area of inquiry. In the second level, data selection, involves the identification of potential data sources (individuals and organizations they represent) associated with the research questions. The respondents are chosen from various expert positions to reflect variety of expertise.

The third level is initiation of data collection from targeted respondents. Data collection is an ongoing process, whereby the researcher can return to the interviewees for clarification and elaboration besides comparing related documents or records with data collected during initiation of the research.

In the fourth level, data analysis, involves a constant comparison method for generating and analyzing data. Data analysis is defined as a process of systematically searching and arranging the interview transcripts, field notes and other materials with the objectives to increase the understanding and to enable researcher to present what have been discovered. Lastly, concluding the research, involves documenting the grounded theory based on researcher observation of the data saturation and sufficient theory which has emerged from the data. Data saturation is the evident when data collection no longer contributes to elaboration of the phenomenon being investigated.

4. Conceptual Framework of This Study

Two research methods that are commonly used are qualitative research and quantitative research. It is suggested that when the goal of a research is to develop a conceptual model for the purpose of building theory around a particular phenomenon or process, an interpretive approach utilizing a qualitative methodology may be more appropriate [2]. On the other hand, if the primary goal of a research problem is to test the validity of a model where all the variables of influence a phenomenon or process is already known, then quantitative methodology may be appropriate [2]. In summary, qualitative research approaches seek to explore phenomena while quantitative research approaches seek to confirm hypothesis about phenomena.

This research is about exploring the context of cyber terrorism, focusing on the attributes or components of cyber terrorism. Since this project is exploratory in nature, a qualitative research by using a grounded theory method is adopted for this study. The phrase grounded theory refers to theory that is developed from a corpus of data through literatures, interviews and observations [24]. In this method, the objectives are to investigate the phenomena under study, to identify and construct attributes of the phenomena, and to develop a conceptual framework that describe the phenomena.

Once the theory discovery and conceptual framework have been developed, the next stage is to test or verify the conceptual framework. The outcome can be achieved by using quantitative method to quantify them and then applied statistical test to conduct the hypothesis test. In this method, the objectives are to evaluate the framework and to test the dynamic relationship of attributes (or components) of the framework.

In short, we believe that a mixed method approach is appropriate to be used in this study in order to accomplish both theory discovery and verification within a single research project. Theory discovery is achieved by using qualitative data to sharpen our theoretical ideas about the phenomena under investigation, while verification is achieved by using quantitative data to quantify them and then applied statistical test to conduct hypothesis test. The combination of qualitative and quantitative techniques within one research study able to incorporate the strength of both methodologies. The framework of research methodology is described below (Figure 2).

The approach discussed in this paper is well described by Srnka and Koeszegi [15] where they state that the combination of two separate studies, one collects and analyzed qualitative and quantitative data sequentially, has been acceptable to researchers in the social science. By conducting qualitative method in a preliminary stage, the objective is for the researchers to develop a conceptual framework (or to generate hypothesis) for the quantitative study. Thus, when qualitative data collection precedes the quantitative data collection, the intent is to first explore the problem under study then follow up on this study with quantitative data that are amenable to studying a large sample so that results might be inferred to a population [25]. We believe that by merging the results provides an overall picture of the research problem.

5. Framework of Data Collection and Data Analysis

In this study, mixed method research involves both collecting and analyzing quantitative and qualitative data in sequential order. The first stage in the analysis cycle is to frame a theory or hypothesis from the literatures which can be used as initial guidance for data collection and data analysis. Once the theory or hypothesis has been generated, the researchers develop questionnaires to get in-depth understanding on the phenomena under investigation. Data collection is a semi-structured method by using in-depth interviews. Interviews are part of most

Figure 2. The framework of research methodology.

interpretive studies and as a key way of accessing the interpretations of informants in the field [26]. Since the first stage is explanatory in nature, data analyses are done by using grounded theory approach. Qualitative research includes a variety of methodological approaches and one example is grounded theory [27]. As have been mentioned earlier, the phrase grounded theory refers to theory that is developed from a corpus of data through literatures, interviews and observations.

In the next stage, quantitative approach is applied to corroborate the researcher’s initial discovery. A survey with close-ended questions format are used for data collection to determine the views and opinions of the population that represents various groups in the society. In this phase, the researcher’s goal is to test the theory or hypothesis, which finding is generalized from a larger representative sampling. Statistical analysis is performed to test the validity of the theory or hypothesis. The numerical findings help to interpret the results, where clearer interpretations of the statistical results are obtained. Figure 3 shows the summary on how the data are collected and analyzed.

6. Suitability of Mixed Method in This Research

All the relevant methodological issues discussed in this paper provide justification and practical approach on how the research is conducted. The methodology explained in this paper provides the researchers with the right direction and understanding in conducting the research by choosing the right research design. Research design as defined by Cooper and Schindler [27] is a plan and structure of investigation so conceived as to obtain answers to research questions. It includes an outline on what the researcher will do from initiation of the research to the final analysis of the data.

In this study, we suggest that a mixed method research approach is appropriate to be applied. The motivation factors in applying the mixed method (as opposed to a single method) are due to the following reasons. Firstly, the nature of the research is exploratory and explanatory in nature, and is grounded in theory. The goals are to discover theory and to develop a conceptual framework that describes the phenomena (qualitative method); and to test or verify the conceptual framework that describes the phenomena (quantitative method). As noted by Yauch and Steudel [13], the mixed method research complements each other, which explains the results of analyses. The qualitative research is interpretive, which allow for the discovery of new ideas and unanticipated occurrences. Qualitative research aims to achieve an in-depth understanding of a situation or a certain phenomenon [27]. Focus of the research is to explore (understand and interpret) of a situation or a certain phenomenon. On another hand, quantitative research aims to achieve precise measurement of something such as participants behavior, knowledge or opinion [27]. Focus of the research is to confirm (describe and explain) hypothesis about a situation or a certain phenomenon. Therefore, by utilizing a mixed method research, we believed it would bring conclusive findings on outcome of this study.

Secondly, mixed method approach helps to answer questions that cannot be answered by qualitative or quantitative approaches alone, thus, provide breadth and depth to the study [28]. Researchers who conduct mixed methods research are more likely to select methods and approaches with respect to their underlying research questions in ways that offer the best opportunity for answering important research questions [28]. In this research, a survey questionnaire using qualitative in-depth interviews is conducted as a way to tap into participants’ perspectives and insights. During analysis, the qualitative researcher uses content analysis of written or recorded materials drawn from participants’ expressions and observations [27] or documents review [2]. Qualitative research study via questionnaires interview, and supplement with close-ended survey systematically provide

Figure 3. Framework for data collection and data analysis.

breadth and depth to the research [12]. Quantitative research looks at the frequency [27] or any kind of research that produces findings arrived at by means of statistical procedures [2]. Through this approach, it is believed that the findings are corroborated across different approaches, thus provide greater confidence in the conclusion.

Lastly, the research framework of mixed method is chosen to apply the concept of triangulation. As noted by Paton [12], one important way to strengthen a study design is through triangulation, or the combination of methodologies in the study of a situation or a certain phenomenon. Paton [12] also argues that triangulation provides accuracy of the data gathered while Olsen [29] argues that triangulation provides validation besides deepening and widening one’s understanding. Triangulation is a term derived from navigation and surveying where different bearings are taken in order to arrive at a precise location. In this study, triangulation involves locating a true position by referring to two or more other coordinates [12]. As noted by Yauch and Steudel [13], triangulation corroborates data and obtains convergent validity. Moreover, triangulation reduces biasness besides be able to heighten the validity of the data collection and analysis.

7. Conclusions

The study on the context of cyber terrorism is quite complex as it is about threat perception which makes the concept differ from one to another. Understanding similarities and differences in perception of what constitutes cyber terrorism can provide insight on the concept of cyber terrorism. The outcome of this study serves the basis for various strategic decisions for policy and decision makers as well as useful foundation for academic research in understanding the context of cyber terrorism. Detail focus analysis can be conducted to investigate and analyze the context of cyber terrorism.

This paper provides information on how this research is conducted. It also describes the framework of research methodology, where we have recommended that the study to be conducted by using a mixed method research: qualitative data and quantitative data are collected and analyzed respectively in a separate phase. This paper also established the conceptual framework that guides the data collection and data analysis techniques. Finally, the research methodology explained in this paper provides the researchers with the right direction by choosing the right research design. The mixed method improves the rigor and explanation of the results, thus bring conclusive findings to the research outcome. By utilizing qualitative and quantitative techniques within the same study, a mixed method research should be able to incorporate the strength of both methodologies and fit together the insights into a workable solution.

8. Acknowledgements

The authors would like to thank the following individuals who provided valuable input to this paper: Dr. Solahuddin Shamsuddin and Zaleha Abd Rahim of CyberSecurity Malaysia. We also would like to thank the Center for Advanced Computing Technology, Faculty of Information and Communication Technology, Universiti Teknikal Malaysia Melaka (UTeM) that provided research grant for this project.

REFERENCES

  1. M. Crotty, “The Foundation of Social Research: Meaning and Perspective in the Research Process,” Allen and Unwin, St Leonards, 1998.
  2. D. Levy, “Qualitative Methodology and Grounded Theory in Property Research,” Pacific Rim Property Research Journal, Vol. 12, No. 4, 2006, pp. 369-388.
  3. J. M. Case and G. Light, “Emerging Methodologies in Engineering Education Research,” Journal of Engineering Education, Vol. 100, No. 1, 2011, pp. 186-210.
  4. D. A. Simanjuntak, H. P. Ipung and C. Lim, “Text Classification Techniques Used to Facilitate Cyber Terrorism Investigation,” Proceeding of Second International Conference on Advances in Computing, Control, and Telecommunication Technologies (ACT 2010), Jakarta, 2-3 December 2010, pp. 198-200. doi:10.1109/ACT.2010.40
  5. M. Dogrul, A. Aslan and E. Celik, “Developing an International Cooperation on Cyber Defense and Deterrence against Cyber Terrorism,” 3rd International Conference on Cyber Conflict, Tallinn, 7-10 June 2011, pp. 1-15.
  6. M. Conway, “Against Cyberterrorism,” Communications of the ACM, Vol. 54, No. 2, 2011, p. 26. doi:10.1145/1897816.1897829
  7. Z. Yunos, S. H. Suid, R. Ahmad and Z. Ismail, “Safeguarding Malaysia’s Critical National Information Infrastructure (CNII) against Cyber Terrorism: Towards Development of a Policy Framework,” IEEE Sixth International Conference on Information Assurance & Security, Atlanta, 23-25 August 2010, pp. 21-27.
  8. P. A. H. Williams, “Information Warfare: Time for a Redefinition,” Proceedings of the 11th Australian Information Warfare & Security Conference, Perth Western, 30 November-2 December 2010, pp. 37-44.
  9. C. Czosseck, R. Ottis and A. M. Taliharm, “Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security,” International Journal of Cyber Warfare and Terrorism, Vol. 1, No. 1, 2011, pp. 24-34. doi:10.4018/ijcwt.2011010103
  10. J. Matusitz, “Social Network Theory: A Comparative Analysis of the Jewish Revolt in Antiquity and the Cyber Terrorism Incident over Kosovo,” Information Security Journal: A Global Perspective, Vol. 20, No. 1, 2011, pp. 34-44.
  11. R. Ahmad and Z. Yunos, “A Dynamic Cyber Terrorism Framework,” International Journal of Computer Science and Information Security, Vol. 10, No. 2, 2012, pp. 149- 158.
  12. M. Q. Paton, “Qualitative Evaluation and Research Methods,” 2nd Edition, SAGE Publications, Thousand Oaks, 1991.
  13. C. Yauch and H. Steudel, “Complementary Use of Qualitative and Quantitative Cultural Assessment Methods,” Organizational Research Methods, Vol. 6, No. 4, 2003, pp. 465-481. doi:10.1177/1094428103257362
  14. S. C. Currall, T. H. Hammer, L. S. Baggett and G. M. Doniger, “Combining Qualitative and Quantitative Methodologies to Study Group Processes: An Illustrative Study of a Corporate Board of Directors,” Organizational Research Methods, Vol. 2, No. 1, 1999, pp. 5-36. doi:10.1177/109442819921002
  15. K. J. Srnka and S. T. Koeszegi, “From Words to Numbers: How to Transform Qualitative Data into Meaningful Quantitative Results,” Schmalenbach Business Review, Vol. 59, No. 1, 2007, pp. 29-57.
  16. A. Bryman, “Integrating Quantitative and Qualitative Research: How Is It Done?” Qualitative Research, Vol. 6, No. 1, 2006, pp. 97-113.
  17. R. J. Chenail, “Conducting Qualitative Data Analysis: Qualitative Data Analysis as a Metaphoric Process,” The Qualitative Report, Vol. 17, No. 1, 2012, pp. 248-253.
  18. A. Tang, P. Avgeriou, A. Jansen, R. Capilla and M. Ali Babar, “A Comparative Study of Architecture Knowledge Management Tools,” Journal of Systems and Software, Vol. 83, No. 3, 2010, pp. 352-370. doi:10.1016/j.jss.2009.08.032
  19. R. Hoda, J. Noble and S. Marshall, “Using Grounded Theory to Study the Human Aspects of Software Engineering,” Proceeding of HAoSE 10 Human Aspects of Software Engineering, Nevada, 17-21 October 2010.
  20. A. A. Singh, A. Urbano, M. Haston and E. Mcmahan, “School Counselors’ Strategies for Social Justice Change: A Grounded Theory of What Works in the Real World,” American School Counselor Association, Vol. 13, No. 3, 2010, pp. 135-145.
  21. T. M. Egan, “Grounded Theory Research and Theory Building,” Advances in Developing Human Resources, Vol. 4, No. 3, 2002, pp. 277-295.
  22. M. Jones and I. Alony, “Guiding the Use of Grounded Theory in Doctoral Studies—An Example from the Australian Film Industry,” International Journal of Doctoral Studies, Vol. 6, 2011, pp. 95-114.
  23. J. Esteves, U. Politécnica and J. Carvalho, “Use of Grounded Theory in Information Systems Area: An Exploratory Analysis,” European Conference on Research Methodology for Business and Management, 2000, pp. 129- 136.
  24. J. W. Creswell, “Qualitative Inquiry and Research Design: Choose among Five Traditions,” Sage Publications, London, 1998.
  25. J. M. Azorin and R. Cameron, “The Application of Mixed Methods in Organisational Research: A Literature Review,” Electronic Journal of Business Research Methods, Vol. 8, No. 2, 2010, pp. 95-105.
  26. G. Walsham, “Doing Interpretive Research,” European Journal of Information Systems, Vol. 15, No. 3, 2006, pp. 320-330. doi:10.1057/palgrave.ejis.3000589
  27. D. R. Cooper and P. S. Schindler, “Business Research Method,” McGraw-Hill Companies, Inc., New York, 2008.
  28. R. B. Johnson and A. J. Onwuegbuzie, “Mixed Methods Research: A Research Paradigm Whose Time Has Come,” Educational Research, Vol. 33, No. 7, 2004, pp. 14-26. doi:10.3102/0013189X033007014
  29. W. Olsen, “Triangulation in Social Research: Qualitative and Quantitative Methods Can Really Be Mixed,” In: M. Holborn, Ed., Development in Sociology, Causeway Press, Ormskirk, 2004, pp. 1-30.