Describe the key problems and issues in the case study

Assignment Help Computer Engineering
Reference no: EM131985689

Asasignment

GUIDELINES FOR WRITING A CASE STUDY

A case study analysis requires you to investigate a problem, examine the alternative solutions, and propose the most effective solution using supporting evidence. Your submission should be no more than 2 pages and needs to adhere to APA formatting for spacing and citations. Include a title page, your case study (1-2 pages), and reference page.

Preparing the Case

Before you begin writing, follow these guidelines to help you prepare and understand the case study:

1. Read and examine the case thoroughly

o Take notes, highlight relevant facts, underline key problems.

2. Focus your analysis

o Identify two to three key problems
o Why do they exist?
o How do they impact the information security field?
o Who is responsible for them?

3. Uncover possible solutions

o Review course readings, discussions, outside research, and your experience.

4. Select the best solution

o Consider strong supporting evidence, pros, and cons: is this solution realistic?

Drafting the Case

Once you have gathered the necessary information, a draft of your analysis should include these sections:

1. Introduction

o Identify the key problems and issues in the case study.
o Formulate and include a thesis statement, summarizing the outcome of your analysis in 1-2 sentences.

2. Background

o Set the scene: background information, relevant facts, and the most important issues.

3. Alternatives

o Outline possible alternatives (not necessarily all of them)
o Why are alternatives not possible at this time (if not possible)?

4. Proposed Solution

o Provide one specific and realistic solution
o Explain why this solution was chosen
o Support this solution with solid evidence

5. Recommendations

o Determine and discuss specific strategies for accomplishing the proposed solution.
o If applicable, recommend further action to resolve some of the issues
o What should be done and who should do it?

Finalizing the Case

After you have composed the first draft of your case study analysis, read through it to check for any gaps or inconsistencies in content or structure: Is your thesis statement clear and direct? Have you provided solid evidence? Is any component from the analysis missing?

When you make the necessary revisions, proofread and edit your analysis before submitting the final draft.

Reference no: EM131985689

Questions Cloud

How effectively did the early childhood professional respond : How effectively did the early childhood professional respond to the given situation? Where do the responses fall short? Identify references and examples
Confidence interval for the mean weight of a packet : Use this data to construct and interpret a 95% confidence interval for the mean weight of a packet of Jolly Jubes.
What would you suggest the senior management team : Evaluate a situation in which conflict occurred within a team. You will then propose a solution based on this week's Learning Resources.
Identify one source of downloadable geographic data : Identify one source of downloadable geographic data in a .shapefile format that can be used in a GIS program.
Describe the key problems and issues in the case study : Describe the key problems and issues in the case study. Formulate and include a thesis statement, summarizing the outcome of your analysis in 1-2 sentences.
System of linear equations and solving the system : Find the numbers by setting up a system of linear equations and solving the system using the elimination method.
Simulate the creation of a mobile application : You are required to identify an organization, and then utilize the knowledge acquired in the course to simulate the creation of a mobile application
Calculate the space-mean speed : These vehicles have been timed over space, so the space mean speed can be calculated from the average times for each set. Calculate the space-mean speed,
Find two consecutive page numbers in a book : Find two consecutive page numbers in a book such that the sum of the page numbers is 11 less than their product.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Prepare test environment for mail server

Communication Server Administration (COMP 30005) - Write a work proposal about the requirements to perform Task 2. Submit a work proposal for this assignment by the end of week 7 and Prepare Test environment for mail server - Analyse various mail ser..

  Describe a small specific change that you could make

Describe a small specific change that you could make to the code in question 2 that would trigger an error in that phase (and not any previous phase).

  Advise them on the use of cloud computing

SoftArc Engineering, a local engineering company has engaged you as a consultant to advise them on the use of Cloud computing in their daily operations.

  Discuss how many bits will be used for the subnet id

How many possible hosts are there on each subnet, Discuss How many bits will be used for the subnet id

  Calculate the beamwidth of a microwave dish antenna

Calculate the beamwidth of a microwave dish antenna with a 6-m mouth diameter when used at 5 GHz.

  Is there an error in this pseudocode

There is an error in this pseudocode, can you help me find it?

  Choose the employee''s last name

Group employees by salary within their job code: choose the employee's last name and group them by salary within their job_title_code.

  Verilog model of positive-edge-triggered 4-bit ring counter

Write a Verilog model of a positive-edge-triggered 4-bit Ring Counter. Choose one of the two types of ring counter described in the linked Wikipedia article to model: either the Straight Ring (Overbeck) Counter, or the Twisted Ring (Johnson) Count..

  What might produce high frrs

Give them advice and reasons for your advice. Include in your explanation what do FRRs mean when fingerprint scanning is used to secure a PC against walk-up attacks?

  Write out the encrypted data from the vector to a new file

Write out the encrypted data from the vector to a new file, e.g. output.txt. ?Replace the original character with the encrypted character in your vector.

  Discuss the four operations of the machine cycle

All of us use the four operations of the machine cycle every day. Think of an activity that you have performed this week and discuss how you used each of the operations of the machine cycle in that activity. Be sure to specify which parts of the a..

  Create a disaster plan to protect the organization

build a disaster plan for your selected organization that includes how you will recommend the company back up and protect network data. Your plan should be 1,250 to 1,500 words in length and your recommendations must be based on the RAID system of..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd