In this assignment you will demonstrate your mastery of the following course outcomes:
• Develop a research question that address contemporary issues in physical security by
applying appropriate technological theories
• Interpret research to identify patterns for drawing evidence-based conclusions
• Differentiate between qualitative and quantitative research methods for their appropriate
applications to data-informed decision making in physical security
• Articulate the importance of the scientific method for ethically conducting research in the
technological field
•
Requirements
Specifically, the following critical elements must be addressed in 750 to 1000 words using
APA format. Your title page and reference list are not included. Information that is not
common knowledge must be cited.
A. Introduction: Provide a
ief overview of the contemporary issue you selected and its
importance with respect to a trend in the field of physical security. Include necessary
information to set the stage. Consider how the issue plays a larger role in the field
information technology.
B. Research Question: In this section, you will develop a research question informed by
your previous literature analysis. This question will assist you by focusing on future
esearch in a specific area of information technology.
a. Develop a research question that addresses the contemporary physical security
issue you selected, based on your previous research analysis. For example, you
may create a research question that asks, “How can the strategies of physical
security enhance safety in public places?”
. Outline the existing assumptions and limitations of the research question. For
example, what are specific aspects of the issue, and in what ways will your
esearch question address those limitations? Consider the influence of bias, the
length of time required for observation to provide reliable information, and
whether or not the population sample accurately represents the research question.
c. Select a theory that best explains the reasoning behind your research question. In
other words, use technological theory to explain why your research question is
necessary to research further. Justify your selection.
I. Analysis & Methodology: In this section you will conduct research on your previously
selected or faculty approved physical security issue. You will summarize the research and
analyze the research designs to identify their advantages and disadvantages, informing
possible future research of the issue.
a. Summarize each of your research articles, identifying common themes and
esearch methodologies and discussing key findings for each article.
. What are the advantages of qualitative and quantitative research
methodologies, and a combination of multiple research methods, in informing
decision making about your chosen issue? Provide specific examples from the
esearch to support your determinations.
c. What are the disadvantages of qualitative and quantitative research
methodologies, and a combination of multiple research methods, in informing
decision making about your chosen issue? Provide specific examples from the
esearch to support your determinations.
d. Draw connections between the research design and the methodology used in the
chosen research. How does the research design inform the methodology used, or
vice versa?
e. What methods do you believe practitioners applied to this study to protect the
validity of their investigations and not project their own assumptions on the
empirical evidence? Consider how this research could have been done in an
ethical manner.
f. What were the ethical considerations in conducting research in this particular field
and in addressing this issue? Provide examples from your research to support your
esponse.
II. Conclusions and Future Direction: To conclude, you will identify patterns in the
esearch, discuss the importance of using the scientific method in research, and consider
the future direction of research on the topic.
a. What patterns did you identify in the research, and what conclusions could you
form about your research question based on these patterns? Ensure that you use
oth qualitative and quantitative studies when identifying patterns. What
conclusions might you make about your research question based on these
patterns?
. How did you use the scientific method to ensure you conducted your research
ethically? Provide specific examples. For example, how did you use the scientific
method to ensure that you did not project your own assumptions on the empirical
evidence?
c. In what ways would you approach this research differently in the future? How
could you expand on this research to consider new developments?
ISOL-634 PHYSICAL SECURITY
Annotated Bibliography for the Final Project
Name of Student: Alok Kumar Dubey
Course and Section Number: ISOL XXXXXXXXXXPhysical Security
Overview: In week four, you completed Milestone One of the final project to provide an overview of the issue you selected and that was approved for your project. That overview outlined the importance of your selected issue with respect to a trend in the field of criminal justice and included information necessary to set the stage for your “supervisor.” Now you will identify and summarize five peer-reviewed scholarly articles that you will use to conduct further research on the selected issue for your final project.
An annotated bibliography is a list of citations for books, articles, and documents. Each citation is followed by a
ief descriptive and evaluative paragraph (usually under 150 words): the annotation.
Prompt: Create an annotated bibliography summarizing the 10 peer-reviewed scholarly articles, which include both qualitative and quantitative research, that you will use for research for your final project.
Instructions:
1. Save this worksheet to your computer and begin work.
2. Refer to week four Worksheet Ru
ic for more information on how your submission will be graded.
Use the UC Li
ary to locate peer reviewed scholarly articles. You must include at least two articles based on quantitative research and at least two articles based on qualitative research. The following UC Li
ary resources can assist you: https:
www.ucumberlands.edu/li
ary
3. Complete the worksheet for article #1:
Citation Jahankhani, H., Al-Nemrat A. & Hosseinian-Far A XXXXXXXXXXCybercrime Classification and Characteristics.
(use APA style)
Does the article use qualitative research or quantitative research?
The article uses qualitative research.
Article summary
The research in the article is about the classification and characteristics of cybercrime. The article is related to my select issue as it deals with types of cybercrimes and the people involved in it. The research in the report is similar to other topics as it explains cybersecurity in IT organizations, for example, the banking sector.
4. Complete the worksheet for article #2:
Citation John P. Mello, Jr., Cybercrime Diary, Vol. 4, No. 1: XXXXXXXXXXWho’s Hacked? Latest Data Breaches And Cyberattacks
(use APA style)
Does the article use qualitative research or quantitative research?
(highlight the research type)
Article summary
The research in the article is about dealing with the latest cyber-crimes experienced in various organizations. The material is related to my select issue as it details the data
eaches and cyber-attacks on various IT organizations. The research in the article is relevant to other topics as it listed the cyber-attacks on numerous organizations in 2019 and how it impacted them.
5. Complete the worksheet for article #3:
Citation Liaqat Ali, 2019. "Cyber Crimes-A Constant Threat For The Business Sectors And Its Growth (A Study Of The Online Banking Sectors In GCC)," Journal of Developing Areas, Tennessee State University, College of Business, vol. 53(1), pages XXXXXXXXXX, January-M.
(use APA style)
Does the article use qualitative research or quantitative research?
(highlight the research type)
Article summary
The research in the article is about showing how cyber-crime is a threat to the growth of business in the banking sector. The report is related to my select issue as it showcases how cyber-crimes are a significant threat to a bank and how it affects its growth. The data in research is collected via a survey. The research in the article is related to other topics as it lays the foundation for how cyber-crimes affect the banking sector.
6. Complete the worksheet for article #4:
Citation Sujata Rao & Kaushik Kudtarkar, 2018. "Causes & Prevention for Security Breaches to Online Banking," Proceedings of International Academic Conferences 7209505, International Institute of Social and Economic Sciences.
(use APA style)
Does the article use qualitative research or quantitative research?
(highlight the research type)
Article summary
The research in the article is about explaining the causes and prevention measures that can be used to protect its assets. The article is related to my select issue as it expands on the reasons for why cyber-crime is committed and several guidelines or prevention techniques. The research in the article is related to other topics as it helps in understanding the threats and mitigation steps for issues described in previous sections.
7. Complete the worksheet for article #5:
Citation Dilek, Selma & Çakır, Hüseyin & Aydın, Mustafa XXXXXXXXXXApplications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review. International Journal of Artificial Intelligence & Applications XXXXXXXXXX/ijaia XXXXXXXXXX.
(use APA style)
Does the article use qualitative research or quantitative research?
(highlight the research type)
Article summary
The research in the article is about showing how artificial intelligence can be used to future cybercrimes. The article is related to my select issue as it shows how latest technologies like AI can be used to detect and mitigate the threats from emerging threats in cyber security. The research in the article is related to other topics as it concludes with explaining how AI will be used to combat cyber-crimes.
8. Save your work and submit it to Blackboard.