O'Reilly logo

Research Methods for Cyber Security by David O. Manz, Thomas W. Edgar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10

Quasi-experimental Research

Abstract

Cyber space is expansive and growing. Every day there are more cyber devices being activated and more functionality is being added to the domain. Although fully controlled experiments are the ideal, the scale and complexity of cyber space can make this very difficult and in many cases unfeasible. This chapter discusses quasi-experimentation methods to help when not all the variables can be controlled fully.

This chapter will cover the differences between true and quasi-experiments, including general factors for quasi-experiments. Common factors in cyber security research that lead to using quasi-experimental approaches are then covered. These factors are helpful in providing a starting list of potential ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required