Is the problem rooted in literature

Assignment Help Basic Computer Science
Reference no: EM133172459

Getting closer to your dissertation, you will need to choose a topic in your first dissertation class, so it is essential to start preparing. let us take a look at some topics to consider, and by the end of the week, we could have several ideas for dissertation topics

Since you have already examined several research articles, another way would be to examine previous dissertations in these areas.

go to the Dissertation Database, and locate an interesting topic on Information governance models, frameworks, regulations, etc.

Here are some pointers that will help critically evaluate some viable topics.

- Is the topic attainable for a first-time dissertation student?

- Is the problem rooted in the literature?

- Is the research empirical, i.e., is there a survey, is there an interview guide, has the data been analyzed via some statistical tool?

- Is there a theoretical model or framework discussed?

Discuss the topic, the problem the model has been used in the research, and any present findings.

Reference no: EM133172459

Questions Cloud

Remote recovery site : We develop good DR plans and some of those plans will include a remote recovery site (hot or cold).
Primary recommendations regarding passwords : An IT Security consultant has made three primary recommendations regarding passwords:
Research sociotechnical systems : Explain how leadership and management styles evolved to support and encourage a sociotechnical approach. Consider historical changes.
Efficiency and effectiveness metrics : Many people say that efficiency and effectiveness metrics are interrelated and that you can't really have one without the other
Is the problem rooted in literature : Is the problem rooted in the literature? Is there a theoretical model or framework discussed?
Develop research and data analytical skills : Develop research and data analytical skills for use in solving business problems.
How much of the proceeds from the issuance of the bonds : At the beginning of the year, the entity had an outstanding 5% convertible bond with a face value of P10,000,000. How much of the proceeds from the issuance
How many units must Yedam sell to earn an after-tax profit : Sales revenue 1,350,000; Variable costs 810,000; Fixed costs 432,000. How many units must Yedam sell to earn an after-tax profit of 180,000
What is the loan amount : We borrow a sum repayable in 15 installments of 10.000 Euros each paid at the end of the period. The interest rate being at 12% what is the loan amount

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Encountered resistance to change with technology

Share an experience from home, school, or work in which you encountered resistance to change with technology. How was the situation handled?

  Discuss the advantages of using ssh

Discuss the advantages of using SSH instead of telnet for remote access to routers. Why is this important on a production network?

  Creating framework for manufacturing business

How can UML be useful towards creating an on-line course instead of creating framework for manufacturing business?

  Ethernet used for enterprise access

Ethernet used for Enterprise Access

  Define PaaS and cloud computing

Define and discuss cloud computing. Define scalability and discuss how the cloud impacts it. Define and describe PaaS.

  Especially in regard to innovation technology

We focus on what non-executives need to know regarding technology. Especially in regard to innovation technology.

  Key requirement for database is to access specific record

The key requirement for the database is to access a specific record as quickly as possible without any concern regarding the internal structure of the record.

  Analyze asymmetric and symmetric encryption

You will analyze asymmetric and symmetric encryption. You must use a minimum of three scholarly articles to complete the assignment.

  Forward traffic to the rest of network

You have noticed that the return traffic comes back through the standby router. Will this cause problem with HSRP or your applications?

  COSO framework of internal controls is practiced

The COSO framework of internal controls is practiced within companies around the world. What do you feel auditor would most be concerned with during IT audit?

  Resources affect team dynamics

How can changes to the availability of resources affect team dynamics?

  The process of creating the contingency plan

Explain why it is important to include end-users in the process of creating the contingency plan?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd