Identify a cyber incident or an international situation

Assignment Help Computer Engineering
Reference no: EM132096913

Assignment 2: Cyber Research Proposal

Within INTL 647 you are required to design a line of research around an assessment of specific cyber issue. In this case, you can select the issue that you identified in your Cyber White Paper assignment (Assignment #1).

You are encouraged to refer to Belcher, Wendy Laura. 2009. "Editing Your Sentences" In Writing Your Journal Article in 12 Weeks. A Guide to Academic Publishing Success. Sage. This resource has an excellent step-by-step process for enhancing your writing.

The goal of this assignment is to present a clear research proposal. Your research proposal should be between 5-6 pages in length not including your preliminary source list and references.

You will need to:

1) Identify a cyber incident or an international situation that contains significant cyber issue. Assess and provide some contextual information that helps demonstrate your understanding of the nature of the issue or case.

2) Clearly state your research question.

3) Explain why this issue is important to investigate. What can we learn from this situation? How will the knowledge we gain through your research help our understanding of cognition, information processing errors and/or decision-making errors?

4) Discuss your theoretical framework. Here you will summarize/synthesize some of the theories/models and concepts you'll use to investigate the intelligence/decision-making failures such as consistency theory, balance theory, bolstering, groupthink and etc.

5) Discuss your research design. Your research design should discuss how you plan to carry out your analysis.

Heath and Tynan have a short but insightful article on "Crafting a Research Proposal," which can be accessed

6) Identify a list of 8 preliminary sources, 6 of which must be from peer-reviewed journals. These should be listed using Turabian References style formatting.

Format. Your proposal should include a title page, proposal body, reference page, and a preliminary source list (title, references page, and source list are not included within the page count). Your paper should have 1-inch border on all four sides, use Times New Roman-12 point font, be double spaced, and not have an extra space in between paragraphs. All references and citations are in Chicago Turabian format.

This information is from the Master's Capstone Manual and it should help you develop your research proposal. Students taking the capstone option are required to submit a 5 page research proposal prior to moving forward on their research. These are some of the sections they are required to include within their proposal, they have been included in these instructions as they directly relate to the goals of this assignment.

Introduction. Identifies your specific research question and sets the general context for the study.

• Statement of the problem and context leading to a clear statement of the specific research question.

• Background and contextual material justifying why we should study this case or topic.

• Purpose statement.

Theoretical Framework. The theoretical framework section develops the theories or models to be used in the study and shows how you have developed testable research hypotheses.

• Introduction discussing gaps in the literature, how this study will help fill some of those gaps, and justification for theory or model to be used in study.

• Summary of the theory or model to be used in the study, including a diagram of the model if appropriate.

• Statement of hypotheses to be tested.

Research Design. Describes how you will test the hypothesis and carry out your analysis. It describes the data you will use to test your hypothesis, how you will operationalize and collect data on your variables, and the analytic methods that you will use, noting potential biases and limitations to your research approach. It should include.

• Identification and operationalization (measurement) of variables.

• Sampling plan (i.e., study population and sampling procedures, if appropriate).

• Justification of case studies used.

• Data Collection/Sources (secondary literature, archives, interviews, surveys, etc.).

• Summary of analysis procedures (pattern-matching, etc.).

• Limitations of study and bias discussion.

Preliminary Source List. List of at least eight sources you plan to utilize within your paper, six of which must be from the peer reviewed literature.

Reference List. Reference the works that you have cited (direct quotes or paraphrases) in the text. This must be in the school's prescribed format. [In INTL this means Turabian format, either using the author-date method or the bibliography-notes method]

Reference no: EM132096913

Questions Cloud

Marketing activities have recently appeared in the news : Select three marketing topics from different companies whose marketing activities have recently appeared in the news.
Efficient way of estimating the test error : Suggest a more computationally efficient way of estimating the test error.
Perform analytical research to best guide their action : Utilizing an objective stance, you will take on the role as a consultant for a new small restaurant chain located in your home state.
The majority of which command large market shares : BEC has been around for more than 50 years and has many well-known brands, the majority of which command large market shares.
Identify a cyber incident or an international situation : Identify a cyber incident or an international situation that contains significant cyber issue. Assess and provide some contextual information that helps.
Discusses some common budget busters : Discusses some common "budget busters" and makes the case for discipline in planning a production.
Identify problems with maintaining legacy systems : COIT20246 - ICT Services Management - cq university - Find and summarise ONE resource that describes ONEother commercial IaaS provider that is NOT Google
Describe the process you and your project team would follow : Develop a "Lesson Learned" document for your organization and for your project stakeholders.
What are some best practices for project selection : What are some best practices for project selection? What leads to project success? What leads to project failure?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a function definition for a function called one more

Write a function definition for a function called one More, which has a formal parameter for an array of integers and increase value of each array element by 1.

  Draw the graphic symbol of a dual 4-to- 1-line multiplexers

Draw the graphic symbol of a dual 4-to- 1-line multiplexers with common selection inputs and a separate enable input for each multiplexer.

  How can you visualize a 4-dimensional array

How can you visualize a 4-dimensional array - How can you give meaning to each dimension this array has?

  Select one of the social media tools noted above and

select one of the social media tools noted above and explain how this application can be used to collect data from

  What are some types of surfaces that you would expect to

you will process a variety of porous and nonporous items for latent prints using black fingerprint powder or crushed

  Designing the flow chart

Draw a flowchart describing the following given situations: The data found on employee time cards are keyed onto the hard disk before they are processed by the computer.

  Express back-end and front-end applications

explain procedures (subroutines) and functions and the difference between them.

  Show two different ways you can access the second qword

Show the declaration of two initialized QWORDs in sequential memory locations with a single label named "myData" pointing to the first location.

  What is the shadow price on the availability of maximo beans

In order to maximize weekly profit, how many pounds of each component should be purchased? What is the shadow price on the availability of Maximo beans?

  The integration of data management and analytics technology

What opportunities are created by the integration of data management and analytics technologies under the same conceptual architecture?

  How can we prepare to meet the challenges of that future500

what will the future hold for those in the information technology field?how can we prepare to meet the challenges of

  What controls would prevent or minimize an outbreak

Research a news story related to software license agreements. What controls would prevent or minimize an outbreak within a company?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd