In this assignment you will demonstrate your mastery of the following course outcomes: • Develop a research question that address contemporary issues in physical security by applying appropriate...

1 answer below »
Have to wrote a research paper using the links present in annotation file.


In this assignment you will demonstrate your mastery of the following course outcomes: • Develop a research question that address contemporary issues in physical security by applying appropriate technological theories • Interpret research to identify patterns for drawing evidence-based conclusions • Differentiate between qualitative and quantitative research methods for their appropriate applications to data-informed decision making in physical security • Articulate the importance of the scientific method for ethically conducting research in the technological field • Requirements Specifically, the following critical elements must be addressed in 750 to 1000 words using APA format. Your title page and reference list are not included. Information that is not common knowledge must be cited. A. Introduction: Provide a brief overview of the contemporary issue you selected and its importance with respect to a trend in the field of physical security. Include necessary information to set the stage. Consider how the issue plays a larger role in the field information technology. B. Research Question: In this section, you will develop a research question informed by your previous literature analysis. This question will assist you by focusing on future research in a specific area of information technology. a. Develop a research question that addresses the contemporary physical security issue you selected, based on your previous research analysis. For example, you may create a research question that asks, “How can the strategies of physical security enhance safety in public places?” b. Outline the existing assumptions and limitations of the research question. For example, what are specific aspects of the issue, and in what ways will your research question address those limitations? Consider the influence of bias, the length of time required for observation to provide reliable information, and whether or not the population sample accurately represents the research question. c. Select a theory that best explains the reasoning behind your research question. In other words, use technological theory to explain why your research question is necessary to research further. Justify your selection. I. Analysis & Methodology: In this section you will conduct research on your previously selected or faculty approved physical security issue. You will summarize the research and analyze the research designs to identify their advantages and disadvantages, informing possible future research of the issue. a. Summarize each of your research articles, identifying common themes and research methodologies and discussing key findings for each article. b. What are the advantages of qualitative and quantitative research methodologies, and a combination of multiple research methods, in informing decision making about your chosen issue? Provide specific examples from the research to support your determinations. c. What are the disadvantages of qualitative and quantitative research methodologies, and a combination of multiple research methods, in informing decision making about your chosen issue? Provide specific examples from the research to support your determinations. d. Draw connections between the research design and the methodology used in the chosen research. How does the research design inform the methodology used, or vice versa? e. What methods do you believe practitioners applied to this study to protect the validity of their investigations and not project their own assumptions on the empirical evidence? Consider how this research could have been done in an ethical manner. f. What were the ethical considerations in conducting research in this particular field and in addressing this issue? Provide examples from your research to support your response. II. Conclusions and Future Direction: To conclude, you will identify patterns in the research, discuss the importance of using the scientific method in research, and consider the future direction of research on the topic. a. What patterns did you identify in the research, and what conclusions could you form about your research question based on these patterns? Ensure that you use both qualitative and quantitative studies when identifying patterns. What conclusions might you make about your research question based on these patterns? b. How did you use the scientific method to ensure you conducted your research ethically? Provide specific examples. For example, how did you use the scientific method to ensure that you did not project your own assumptions on the empirical evidence? c. In what ways would you approach this research differently in the future? How could you expand on this research to consider new developments? ISOL-634 PHYSICAL SECURITY Annotated Bibliography for the Final Project Name of Student: Alok Kumar Dubey Course and Section Number: ISOL 634-25 Physical Security Overview: In week four, you completed Milestone One of the final project to provide an overview of the issue you selected and that was approved for your project. That overview outlined the importance of your selected issue with respect to a trend in the field of criminal justice and included information necessary to set the stage for your “supervisor.” Now you will identify and summarize five peer-reviewed scholarly articles that you will use to conduct further research on the selected issue for your final project. An annotated bibliography is a list of citations for books, articles, and documents. Each citation is followed by a brief descriptive and evaluative paragraph (usually under 150 words): the annotation. Prompt: Create an annotated bibliography summarizing the 10 peer-reviewed scholarly articles, which include both qualitative and quantitative research, that you will use for research for your final project. Instructions: 1. Save this worksheet to your computer and begin work. 2. Refer to week four Worksheet Rubric for more information on how your submission will be graded. Use the UC Library to locate peer reviewed scholarly articles. You must include at least two articles based on quantitative research and at least two articles based on qualitative research. The following UC Library resources can assist you: https://www.ucumberlands.edu/library 3. Complete the worksheet for article #1: Citation Jahankhani, H., Al-Nemrat A. & Hosseinian-Far A. (2014). Cybercrime Classification and Characteristics. (use APA style) Does the article use qualitative research or quantitative research? The article uses qualitative research. Article summary The research in the article is about the classification and characteristics of cybercrime. The article is related to my select issue as it deals with types of cybercrimes and the people involved in it. The research in the report is similar to other topics as it explains cybersecurity in IT organizations, for example, the banking sector. 4. Complete the worksheet for article #2: Citation John P. Mello, Jr., Cybercrime Diary, Vol. 4, No. 1: (2019)Who’s Hacked? Latest Data Breaches And Cyberattacks (use APA style) Does the article use qualitative research or quantitative research? (highlight the research type) Article summary The research in the article is about dealing with the latest cyber-crimes experienced in various organizations. The material is related to my select issue as it details the data breaches and cyber-attacks on various IT organizations. The research in the article is relevant to other topics as it listed the cyber-attacks on numerous organizations in 2019 and how it impacted them. 5. Complete the worksheet for article #3: Citation Liaqat Ali, 2019. "Cyber Crimes-A Constant Threat For The Business Sectors And Its Growth (A Study Of The Online Banking Sectors In GCC)," Journal of Developing Areas, Tennessee State University, College of Business, vol. 53(1), pages 253-265, January-M. (use APA style) Does the article use qualitative research or quantitative research? (highlight the research type) Article summary The research in the article is about showing how cyber-crime is a threat to the growth of business in the banking sector. The report is related to my select issue as it showcases how cyber-crimes are a significant threat to a bank and how it affects its growth. The data in research is collected via a survey. The research in the article is related to other topics as it lays the foundation for how cyber-crimes affect the banking sector. 6. Complete the worksheet for article #4: Citation Sujata Rao & Kaushik Kudtarkar, 2018. "Causes & Prevention for Security Breaches to Online Banking," Proceedings of International Academic Conferences 7209505, International Institute of Social and Economic Sciences. (use APA style) Does the article use qualitative research or quantitative research? (highlight the research type) Article summary The research in the article is about explaining the causes and prevention measures that can be used to protect its assets. The article is related to my select issue as it expands on the reasons for why cyber-crime is committed and several guidelines or prevention techniques. The research in the article is related to other topics as it helps in understanding the threats and mitigation steps for issues described in previous sections. 7. Complete the worksheet for article #5: Citation Dilek, Selma & Çakır, Hüseyin & Aydın, Mustafa. (2015). Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review. International Journal of Artificial Intelligence & Applications. 6. 10.5121/ijaia.2015.6102. (use APA style) Does the article use qualitative research or quantitative research? (highlight the research type) Article summary The research in the article is about showing how artificial intelligence can be used to future cybercrimes. The article is related to my select issue as it shows how latest technologies like AI can be used to detect and mitigate the threats from emerging threats in cyber security. The research in the article is related to other topics as it concludes with explaining how AI will be used to combat cyber-crimes. 8. Save your work and submit it to Blackboard.
Answered Same DayJun 19, 2021

Answer To: In this assignment you will demonstrate your mastery of the following course outcomes: • Develop a...

Tanaya answered on Jun 21 2021
126 Votes
Running Head: PHYSICAL SECURITY        1
PHYSICAL SECURITY        11
DATA-INFORMED DECISION-MAKING IN PHYSICAL SECURITY
Table of Contents
A. Introduction    3
B. Research Questions    3
I. Analysis and Methodology    4
Advantage of the Qualitative and Quantitative Research    5
Disadvantage of Quantitative and Qualitative
Methods    5
Connections between Methodology and Research Design    6
Methods Applied by Practitioners in Protecting the Validity    6
II. Conclusion and Future Direction    7
References    8
A. Introduction
Cybersecurity has become one of the existing practices in securing system and networks within any digital infrastructure. This allows the industry to protect their digital infrastructure from malicious attacks and cybercrime damages. Currently, there are several banks, government agencies and institutions and hospitals are building and investing in the cybersecurity is to protect the business practices as well as the million other customers. Most of the companies have been investing in various cybersecurity strategies and firewalls, anti-spyware and anti-virus software.
It is so that they can outwit the cybercriminals from stealing the delicate information of the institution. The current study will be exploring the intensity of the cybercrime issue in the IT infrastructure and the extent it has impacted on the decision-making process in the companies. Further, the study has explored research articles in understanding the methodologies used for collecting information related to the issue during the research process.
B. Research Questions
What extent does cybercrime present newer challenges in the IT industry and how it has impacted the infrastructure?
One of the greatest challenges in the IT industry is tracking down the sophisticated users of internet but committing unlawful acts on the internet (Rao & Kudtarkar, 2018). These unlawful acts are committed by hiding their identities. It is important for close coordination in between the personnel trained and experience in extracting and investigation of the cybercrimes with the law enforcement agencies.
What are the different frameworks that have been implemented by the professionals in protecting the information of the organization?
There are a series of security frameworks in the information technology, which needs to be well-documented so that the policies, procedures and the processes are well understood as well as agreed (Jahankhani, Al-Nemrat & Hosseinian-Far, 2014). This also ensures that a proper method has been followed by the organization in the management of the business. This helps in lowering the vulnerability and risk related to identity and information loss.
What is the extent the theory of evolutionary computation has implemented AI as a defense against cybercrimes?
The evolutionary computation has been utilized with the implementation of Artificial intelligence as a part of the cybersecurity in companies (Dilek, Çakır & Aydın, 2015). The AI system helps in the detection of the malware and viruses with the utilization of the complex algorithm and with the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here