Rooted in the literature

Assignment Help Other Subject
Reference no: EM133169985

During this semester, we reviewed a number of areas in information security and the threats that companies face, we face, the numerous threats and ways we can help to minimize these attacks.

Getting closer to your dissertation, you will need to choose a topic in your first dissertation class, DSRT-736, so it is essential to start preparing. This week, let us take a look at some topics to consider, and by the end of the week, we could have several ideas for dissertation topics

Since you have already examined several research articles, another way would be to examine previous dissertations in these areas.

Visit the University of Cumberland's library, go to the Dissertation Database, and locate an interesting topic on cybersecurity, policy, threats, behavior, etc.

Here are some pointers that will help critically evaluate some viable topics.

- Is the topic attainable for a first-time dissertation student?

- Is the problem rooted in the literature?

- Is the research empirical, i.e., is there a survey, is there an interview guide, has the data been analyzed via some statistical tool?

- Is there a theoretical model or framework discussed?

Reference no: EM133169985

Questions Cloud

Prepare the journal entries for hungry joe : Prepare the journal entries for Hungry Joe's for June 14, Hungry Joe's June 30 year end, and the repayment of the loan
Write a parser for a programming language : Write a parser for a programming language that accepts the following EBNF using the method in textbook Chapters
Determine the amount that should be entered on profit line : These partially completed Income Statement columns from a 10-column work sheet. determine the amount that should be entered on profit line
How would these tax consequences differ : How would these tax consequences differ from the information included in Latkin's GAAP based financial statements
Rooted in the literature : Is the topic attainable for a first-time dissertation student? Is the problem rooted in the literature?
Baseline security requirements : What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure,
BU7006 Strategic Financial management Assignment : BU7006 Strategic Financial management Assignment Help and Solution, University of Chester - Assessment Writing Service
Discussion about the flow of products : Question - Discussion about the flow of products, like the shortest-route problem, which is all about finding the shortest distance
What is the fixed cost per month of keeping the truck : If the interest rate is 5%, which option will you choose? What is the fixed cost per month of keeping the truck for five years

Reviews

Write a Review

Other Subject Questions & Answers

  A machine tools manufacturer wishes to hold information

A machine tools manufacturer wishes to hold information about its customers that the manufacturer produces and sells to them.. draw an entity relationship diagram to represent the system include cardinality and business rule

  What are the components to building an effective team

How would you build a CSIRT? What are the components to building an effective team

  Identify the role the internal-informal support teams

Identify the role the internal/informal support teams play and the external/formal support teams play.

  Describe the role of subjective experience

Describe the health issue you selected and identify key contributors or factors, based on the biopsychosocial model, that could contribute to the development.

  How can you use the understanding yourself

What kinds of information from your readings and independent research support your perspective? What are some examples and anecdotes to illustrate this? Feel free to draw from your own professional experiences. How can you use the Understanding Yours..

  Evaluate how individuals can promote health and wellness

Prepare a 1,200- to 1,400-word paper in which you analyze late adulthood and the death of an individual as a culmination of the life span developmental process.

  Determine societys position on an issue

Opinions about issues in society are often the catalyst for the foundations of social change. The combined opinions of all individuals determine society's position on an issue.

  Why an on-boarding process needs to be created

Explain why an on-boarding process needs to be created. Then create an outline of an on-boarding process. Include a brief explanation of each step.

  Identify the potential risk area or concern

Identify the potential risk area or concern that the planning will address. Describe risks associated with each area

  What is self actualization

What is self actualization? How close to self actualizing do you feel you are and what do you think you need to do to accomplish it

  Summarize the advantages of computers

Summarize the advantages of computers/software and the use of computer technology in investigations.

  What do you think are the most significant vulnerabilities

What do you think are the most significant vulnerabilities that exist in the most important assets associated with each of CIKR sectors? Why - Which CIKR sectors do you think you and your community rely on most? Why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd