Address issues related to cybersecurity

Assignment Help Computer Network Security
Reference no: EM133088047

Problem Statements and Research Questions

PART A

The moodle shell for this week contains two example research papers produced by researchers at the University of Ballarat (Federation University's predecessor) - "Understanding victims of identity theft: A Grounded Theory approach" and "Zero-day malware detection based on supervised learning algorithms of API call signatures". Both papers address issues related to cybersecurity, but they take very different approaches as they use different research paradigms.

As a group, look through these two papers and determine what the key aspects of their problem statement are (these may not be directly stated as a Problem Statement, but can be determined from the Abstract and Introduction sections). For each paper establish:
• What is the problem area?
• What is the aim of the paper?
• What (if any) scoping restrictions are placed on the research?
• What are the research questions? (these may be stated explicitly, or may be implied).

Which paper takes a quantitative approach and which is qualitative? What aspects of the research problem led the researchers to adopt these approaches?

PART B

Perform a similar analysis for some of the papers which you have previously identified during your literature review search. Consider these critically - are the research questions well aligned with the stated aims of the research?

When you have identified the problem statement and research questions for each paper, show these to your tutor so they can provide feedback on your analysis of the paper.

PART C

Based on what you have learnt about problem statements and the literature reading you have done so far, start drafting a problem statement and research questions for your own project. Discuss these with your classmates and tutor.

Don't worry if they aren't perfect at this point. The problem statement and research questions will evolve over the next few weeks as you continue your literature review.

After the lab class

Keep searching for and reading relevant papers related to your chosen topic. Continue working on the Synthesis Matrix assignment which is due in Week 4, and continue to refine the problem statement and research questions which you drafted during this lab class.

Attachment:- Problem Statements and Research Questions.rar

Reference no: EM133088047

Questions Cloud

What are the total equities available : Glo expects sales for 2002 to be P2,000,000, resulting in a return on sales of 10%. What are the total equities available
Analysis of qualitative data : Process of coding which underpins the analysis of qualitative data. While you won't actually be carrying this coding process out as part of assessment
What is the balance of construction in progress account : What is the balance of construction in progress account at the end of the 2020 under percentage of completion method
What is the key difference between IFRS and GAAP : What is the key difference between IFRS and GAAP in terms of financial reporting relative to the Statement of Operations (Income Statement)
Address issues related to cybersecurity : Perform a similar analysis for some of the papers which you have previously identified during your literature review search
What is the seat turnover breakeven of the restaurant : The variable expenses on each menu is 20% of the price. The total fixed costs of the restaurant are 350 000 USD. What is the seat turnover breakeven
Describe six audit risks : Describe SIX audit risks, and explain the auditor's response to each risk, in planning the audit of Blister Pharmaceuticals Co.
Prepare the cost of production report : Prepare the cost of production report that shows the physical flow of units, equivalent units of production, cost per equivalent units & cost reconciliation
Prepare journal entries to account for the bond : Prepare journal entries to account for the bond from 1 January 2020 until 31 December 2024. N Ltd has a financial reporting date of 31 December

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd