Principles of user experience design

Assignment Help Computer Network Security
Reference no: EM133342529 , Length: word count:4000

Learning outcome 1: A critical appreciation of the principles of user experience design and their application to the design of cyber security systems

Learning outcome 2: A critical appreciation of the principles of user experience design and their application to the evaluation of cyber security systems

Learning outcome 3: A critical understanding of the major research themes in usable cyber security

You are required to submit your work within the bounds of the University Infringement of Assessment Regulations (see your Programme Guide). Plagiarism, paraphrasing and downloading large amounts of information from external sources, will not be tolerated and will be dealt with severely. Although you should make full use of any source material, which would normally be an occasional sentence and/or paragraph (referenced) followed by your own critical analysis/evaluation. You will receive no marks for work that is not your own. Your work may be subject to checks for originality which can include use of an electronic plagiarism detection service.

Where you are asked to submit an individual piece of work, the work must be entirely your own. The safety of your assessments is your responsibility. You must not permit another student access to your work.

Where referencing is required, unless otherwise stated, the Harvard referencing system must be used (see your Programme Guide).

Please ensure that you retain a duplicate of your assignment. We are required to send samples of student work to the external examiners for moderation purposes. It will also safeguard in the unlikely event of your work going astray.

Your Task
In this assignment you will devise a 4000 word research proposal in the form of a research proposal document. The proposal should specify a research project that you might like to undertake within Cyber Security and UXD research. You are free to choose the focus of your research proposal but it must sit within the remit of cybersecurity and UXD and therefore have user-centred issues as the primary concern. You are advised to agree your topic with your tutor before starting work. If you wish, you may implement your proposed research in the second assignment which is practically focused. In assignment one you will:
• Review the literature and plan a research activity
• Receive feedback on your work
In assignment 2 (to be disseminated later)
• Develop the research plan further and collect the data.

To do this effectively you must narrow the scope of your research activity and assess its feasibility. For example, it would not be possible for you to engage in an experimental study with 50 users in the time available to you.

You must agree the title of your research proposal with your tutor before submission.

The 4000 word limit for the whole assignment (excluding references) must be adhered to. You are given guidance on individual section length.The literature review component should not exceed 2000 words

The research proposal should have the following headings:

1. Literature Review
The purpose of this section is to set your research proposal in the context of the prevailing literature. Your review should set out the focus of the research; justify your choice of topic; the current state of thinking in relation to your topic and identify themes that are suitable for further investigation. It is essential that the literature you discuss is critically evaluated and that it motivates your research proposal. Therefore, it should be relevant to the topic and research questions. This section should be no more than 2000 words in length.

2. Aims and Research Questions
In this section you should specify the general aim of the research and the specific research question of interest. This must be specified as a question that will be addressed in the proposed study. This question is what your planned research will address. Section 3 and 4 combined should be around1500 words.

3. Research Methods
In this section you will set out the methodology you will follow in order to address the specific research question detailed in section 3. You should describe the methodology and justify why it is appropriate. This section should be detailed and set out in a way that is repeatable including details of participants, materials, etc.

If your work is based around a questionnaire or interview then you should include indicative questions and the proposed analysis method.
If your work is experimental then you should include the experiment design and the analysis methods you would propose to use.
It should be clear that the methodology will deliver the necessary data to answer your research question. Section 3 and 4 combined should be around 1500 words.Remember you are only presenting a plan for the research you should not undertake the research or present real data in this assignment.

Attachment:- Cybersecurity.rar

Reference no: EM133342529

Questions Cloud

Explain the immediate and long-term effects : Explain the immediate and long-term effects of your financial decisions - Much of what your company does is highly specific for individual customers
Sudden onset tearing and ripping pain : The client complains of sudden onset "tearing and ripping" pain in the abdomen, nausea, dizziness, stiff neck, and difficulty breathing.
What is future of the buddhist religion : What is the future of the Buddhist religion, does it face repression, is it growing or declining, is it changing to adapt to the modern world.
Communication plan have in strategic-planning process : What role does a communication plan have in the strategic-planning process? Why is it important to include the stakeholders you identified in the process?
Principles of user experience design : CETM44 Cybersecurity and User Experience Design, University of Sunderland - A critical appreciation of the principles of user experience design
About cardiac effects of trazadone with some psychotropics : What about cardiac effects of trazadone with some other psychotropics? What test could you order for a baseline with this medication to monitor?
Differentiate between model and theory : Differentiate between model and theory. Locate current peer reviewed journal article that applies nursing theory to guide public health nurses in community care
Community stakeholders for population health promotion : Explain the role of the community health nurse in partnership with community stakeholders for population health promotion.
What is your impression of sets of expectations : Review the AACN Master's Essentials and the NONPF NP Core Competencies. What is your impression of these sets of expectations?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd