Questionnaire

Enhancing Cybersecurity in IT-Related Areas

Survey on Enhancing Cybersecurity Measures in IT: Evaluating Practices, Challenges, and Improvement Needs

You are being invited to complete an online survey as part of a Master's Degree Program being undertaken by Praveen Fernando, a student at Cardiff Metropolitan University studying a Master's in Cybersecurity. Don't hesitate to contact me if you have any questions or want more information. You are eligible to take part in this study if you are working in any work sector and aged 18 years and above. 

Study Overview  

Cyberattacks targeting IT systems are on the rise, impacting organizations of all sizes. This survey is part of a dissertation project investigating how to strengthen cybersecurity measures in IT environments.  With the escalating threat landscape, IT professionals are on the frontlines of protecting critical data and infrastructure. Your participation is vital to understanding current practices and identifying where improvements can be made.


Study Objectives


  • To examine common cybersecurity practices in IT and their effectiveness against evolving threats

  • To understand the specific challenges IT professionals face in implementing and maintaining robust security measures

  • To identify potential areas for improvement in IT security protocols, technologies, and training Participation Details.


Should you choose to take part in this study, you will be asked to complete an online survey/questionnaire. This survey will focus on assessing the practices, challenges, and potential improvements related to cybersecurity within IT environments.  The time required to complete the survey is estimated at approximately 10-15 minutes.


Potential Benefits and Risks

While there may be no direct benefits to you, your participation will contribute to research aimed at enhancing cybersecurity across IT sectors. This can help IT teams become more resilient against threats. There are no anticipated risks associated with your participation.


Utilization of Findings

The outcomes of this study will assist the researcher in obtaining relevant information essential for formulating solutions to the research questions. All data will be treated confidentially and used exclusively for academic purposes.


Ethical Approval

This study has received ethical approval from Cardiff Metropolitan University. 

Your Consent

If you are interested in participating, please peruse the statements below and then click 'yes' to signify your consent to participate:


I confirm that I have read and understood the study information. I have had the opportunity to seek clarification and have received satisfactory answers to any questions.

I am aware that my participation is voluntary and that I can withdraw from the study at any point without needing to provide a rationale.

I am aged 18 or above.

Sign in to Google to save your progress. Learn more
Gender *
Age group
Clear selection
Role in your organization
How frequently have you received cybersecurity awareness training in the past year?
Clear selection
Please rate your confidence level in identifying and responding to potential cyber threats:
Clear selection

How would you rate your organization's adherence to cryptographic key management best practices?

Clear selection

How effective do you perceive your organization' s incident detection and response procedures to be?


Clear selection

How concerned is your organization about the potential reputational damage caused by cyber breaches?


Clear selection

 Please rate your organization's overall cybersecurity posture:


Clear selection


 How effective do you find the cybersecurity awareness training provided by your organization?


Clear selection

How relevant do you perceive the cybersecurity awareness training content to be to your daily responsibilities?


Clear selection

How engaging do you find the delivery method of the cybersecurity awareness training (e.g online modules, workshops)?

 
Clear selection

To what extent do you believe your organization prioritizes the implementation of cryptographic protocols for data protection?


Clear selection

How well do you think your organization manages cryptographic keys to ensure data security?


Clear selection

How confident are you in the effectiveness of the cryptographic protocols used by your organization to safeguard sensitive data?


Clear selection

How promptly does your organization respond to detected cybersecurity incidents?


Clear selection

How comprehensive do you perceive your organization's incident detection capabilities to be?


Clear selection

How well-prepared do you feel your organization is to handle complex cyber threats and

attacks?


Clear selection
 How significant do you believe the financial losses incurred from cyber breaches are for your organization?
Clear selection

To what extent do you think cyber breaches negatively affect your organization' s reputation?


Clear selection

How well do you think your organization mitigates the operational disruptions caused by cyber breaches?


Clear selection
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy