Is the problem rooted in the literature

Assignment Help Basic Computer Science
Reference no: EM133197709 , Length: 600 Words

During this semester, we reviewed a number of areas in risk and risk management, risk assessment and the way in which companies can try and minimize their risk exposure. Getting closer to your dissertation, you will need to choose a topic in your first dissertation class, DSRT-736, so it is essential to start preparing. This week, let us take a look at some topics to consider, and by the end of the week, we could have several ideas for dissertation topics. Since you have already examined several research articles, another way would be to examine previous dissertations in these areas. Visit the University of Cumberland's library, go to the Dissertation Database, and locate an interesting topic on risk, a model, framework, some approach to minimizing risk, etc. Here are some pointers that will help critically evaluate some viable topics:

Is the topic attainable for a first-time dissertation student?

Is the problem rooted in the literature?

Is the research empirical, i.e., is there a survey, is there an interview guide, has the data been analyzed via some statistical tool?

Is there a theoretical model or framework discussed?

Discuss the topic, the problem the model has been used in the research, and any present findings.

Reference no: EM133197709

Questions Cloud

Significant information technology theories and models : Bishop State Community College-Write a essay that constructs an overview of the significant information technology theories and models,
Disaster recovery and business continuity : University of the Cumberlands-Discuss two important concepts from this course that are applicable to your degree.? Disaster Recovery and Business Continuity
Provide novice designer with advice : Strayer University-Provide the novice designer with the advice you feel would be most helpful when organizing content for menus.
Menu style computer science : Strayer University-Imagine you have been asked to help a novice designer effectively organize his menu content in an application.
Is the problem rooted in the literature : During this semester, we reviewed a number of areas in risk and risk management, Is the problem rooted in the literature?
How can these challenges be overcome by organization : How do the services, or how could the services, benefit your company? How can these challenges be overcome by an organization?
The integrity of data is critical to your company success : Southern Arkansas University-The integrity of data is critical to your company's success. The company makes an average profit of $100,000 per year.
Blockchain App Maintenance-Updating the business network : New York Institute of Technology Manhattan Campus-Find the command in Chapter 8 of the course textbook to Download a new version of the smart contract code.
Determine which cloud service model : Southern New Hampshire University-Why company in scenario would want to run cloud environment. Determine which cloud service model you would use for that cloud.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Corrupt operating system that cannot be booted

You boot from the XP DVD. The blue screen portion of the setup process shows a single 1.5 GB partition on your computer. What should you do next?

  Briefly describe the type conversion

Implement a FUZZY class. Fuzzy logic defines true, false, and maybe. The AND operator returns the weaker of its two parameters, and the OR operator returns.

  Understanding of the concepts from the cmis

This assignment demonstrates your understanding of the concepts from the CMIS 141 class.

  Annually after taxes on your investment

How much do you need to save each month if you can earn 6.45% after taxes on your investment?

  AI Ethical principles

Which principle seems the most difficult to enforce? What AI services that you have studied so far worry you the most? Why?

  Creating engaging programs

Existing security awareness programs are full of PowerPoints, job aids, and even stickers and buttons with catchy slogans to provide coworkers with the latest information about an organization's security plan. The information may be "the latest," ..

  Create a bill of materials and place it in the drawing

Open the livroom.dwg file from Chapter 33, which contains several pieces of furniture. Add attributes to the furniture and create blocks. Using the Data Extraction wizard, create a bill of materials and place it in the drawing.

  How business processes as services can increase threat

Most of us are familiar with SaaS, PaaS, IaaS, etc. Consider how business processes as services can increase the threat surface.

  Structured-semistructured and unstructured data

Compare inheritance in the EER model to inheritance in the OO model. What are the differences between structured, semistructured, and unstructured data?

  Learning team collaborative discussion

Based on your Week Two Learning Team Collaborative discussion, submit, individually, a comparison of the different kinds of unified communication platforms, their features and functionality, based on the five criteria. The criteria are 1) Usabilit..

  What is the throughput of the connection

In a TCP connection, the window size fluctuates between 60,000 bytes and 30,000 bytes. If the average RTT is 30 ms, what is the throughput of the connection?

  Covered workforce sourcing and project management

Dr. LeClaire's lecture this week covered workforce sourcing and project management

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd