Provide a complete report of your research project

Assignment Help Project Management
Reference no: EM131966838

Assignment: Research Project Report

Task

In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects:

• Overview of the technology involved

• Relevant technologies and applications of those technologies

• Highlighting the challenges/problems in your chosen research area

• Identification of any gaps in the literature by:

o discussing areas/issues that you believe have been addressed in the current literature;
o highlighting areas/issues that have not been addressed or adequately addressed; and
o discussing your view(s) on the issue(s) that you see as being critical.

• Summarize the future research directions based on the identified gaps

To accomplish the above, you are expected to read and critically evaluate recent research in your selected research area by citing a minimum of 5 research articles. Students are encouraged to access such research articles from well known and reputed research portals such as IEEE, ACM, Springer, Wiley etc. Please note Wikipedia and general blogs will not be considered as reputable citations.

Rationale

This assessment continues links back to assessment 3 where students initiated their research project by selecting a research topic in an emerging area of information security. The aim of this task is to help students :

• to demonstrate ability to integrate and apply information from various topics;
• to build an understanding and perspective of current and emerging topics in Information Security;
• to help the students to formulate their research project in a step by step manner; and
• to build generic skills including, critical thinking, analysis, problem solving in the context of Information Security

Additionally, this assessment aligns with the following learning outcomes:

• be able to justify security goals and the importance of maintaining the secure computing environment against digital threats;

• be able to explain the fundamental concepts of cryptographic algorithms;

• be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats;

• be able to compare and contrast the security mechanisms of a trusted operating system with those used in a general purpose operating system;

• be able to investigate and justify the use of the access control mechanisms and user authentication processes;

• be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.

Reference no: EM131966838

Questions Cloud

Random samples of latex : Random samples of LaTeX: n_1=15n1=15 and LaTeX: n_2= 10n2=10 were selected from populations 1 and 2, respectively. The corresponding
Briefly describe community health information network : Briefly describe each of the terms and their relationship to each other Community health information network (CHIN) and Regional health information organization
Calculate the dividends per share on each class of stock : Calculate the dividends per share on each class of stock for each of the four years. If no dividends are paid in a given year, enter "0"
Finances assets entirely with common stock : what is difference between CC's expected ROE if it finances these assets with 40% debt versus expected ROE if it finances assets entirely with common stock?
Provide a complete report of your research project : In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3.
Calculate the chi square statistic for the test : Calculate the chi square statistic for the test if the standard deviation of the selected batteries is 6 minutes.
What is the expected value of stock five years from now : The required return is 14.3 percent and the growth rate is 5.3 percent. What is the expected value of this stock five years from now?
What are its average net accounts receivable : In the table below the information for four companies is provided. If Tamarisk's net credit sales are $716675, what are its average net accounts receivable
Determine where the p-value would be : Using the chi-square table determine where the p-value would be, for the data having df= 5 and computed value is 20.36

Reviews

Write a Review

Project Management Questions & Answers

  Create a project schedule and align resources

Create a project schedule and align resources, Analyze project schedule and resource allocation

  Managerial roles and gap analysis

Write a report on Managerial Roles and Gap Analysis

  Questionaire on project management

Questionaire on Project Management

  Describe the market growth rate for product

Describe the market growth rate for product and service.

  Prepare a work plan and project schedule - gantt chart

Design an online system for the human resources department to manage available job positions.

  Project risk management approach

How does a project risk management approach pro-vide an early warning signal for impending problems or issues

  Black-scholes options pricing model

Calculate the payoff and the profits for investments

  Describe the features or characteristics of product

Describe the features or characteristics of your product or service.

  Write paper on inventory management system

Write paper on Inventory Management System.

  Analysis of the overall project risk

Analysis of the overall project risk

  Investment and performance analysis

Evaluate the usefulness of ROCE

  Distribution strategy and project management

Distribution strategy and project management

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd