Harrisburg GRAD 695 Management of Identity Access in Information Security Research
Harrisburg GRAD 695 Management of Identity Access in Information Security Research ORDER NOW FOR CUSTOMIZED AND ORIGINAL ESSAY PAPERS ON Harrisburg GRAD 695 Management of Identity Access in Information Security Research I have attached the 1. Outline format required for the paper: GRAD695_Research_Proposal_Template_062120.docx 2. Sample final Paper submitted previously: Final Proposal Sample 1 .docx Harrisburg GRAD 695 Management of Identity Access in Information Security Research 3. Previously submitted paper on the topic and feedback: 20200829195102midterm_draft__1_._revised.docx Feedback from the previous submission: WK9_Midterm_FINAL_Feedback_091020.docx Should add the REFERENCES in Word Document under the REFERENCES -> INSERT CITATION and bibliography. grad695_research_proposal_template_062120.docx final_proposal_sample_1.docx midterm_draft__1_._revised..docx wk9_midterm_final_feedback_091020.docx Running head: THE TITLE OF YOUR THESIS Replace This Text Title of Your Thesis Your full name goes here GRAD 695 TITLE OF YOUR THESIS Abstract The Abstract is written as a block paragraph and summarizes your research thesis in a single paragraph (150 to 250 words). It should span one full page. The Abstract is very important, as a reader often uses the Abstract to determine whether the research is applicable to the readers needs before deciding to read the entire document. Think of your Abstract as an Executive Summary of your Thesis that must include and address the following four (4) key items: The specific Topic/purpose of your research, essentially your Problem Statement Your Research Approach, Strategy and Design. This must include your planned method of data collection and method of data analysis. A summary of your Results and Findings of your research A summary of the Conclusions to be derived from your research Additional Abstract Guidance Delete All This When No Longer Needed The Abstract can be started at any time, but will not be finalized until completion of the research thesis. Expect to refine your Abstract at every Thesis iteration. Guidance Article(s) What is an Abstract? Center for Communication Practices Example(s) Culture, Communication & Leadership for Projects in Dynamic Environments Due? Final Draft Final Submission Additional Keywords Guidance Delete All This When No Longer Needed Keywords Keywords Guidance Article(s) Example(s) When Due? Keywords are listed at the bottom of your Abstract. These are the words that you expect a researcher to use in a search engine or library database to locate your research thesis. Note that Keywords are Normal text, not any type of Heading, and must not show up in your Table of Contents. This It should just be a list of words, separated by commas.Harrisburg GRAD 695 Management of Identity Access in Information Security Research APA Style Blog Keywords Culture, Communication & Leadership for Projects in Dynamic Environments Written with completion of thesis with: Final Draft Updated in Final Submission 2 TITLE OF YOUR THESIS Table of Contents Abstract 2 List of Figures .. 6 List of Tables 7 Relationship to Curricular Practical Training (CPT) 8 Overview of CPT Assignment .. 8 Proposed Research and Application to Capstone Project .. 8 Relationship to ISEM 8 Introduction .. 9 Research Overview . 9 Definition of Terms . 9 Background . 9 Problem Description .. 9 Significance of Research .. 9 Theoretical Framework or Construct . 9 EthicalHarrisburg GRAD 695 Management of Identity Access in Information Security Research Considerations 10 Overview of Remaining Thesis Chapters .. 11 Problem Statement and Justification . 12 Problem Statement 12 Purpose Statement 12 Research Questions and Objectives .. 12 3 TITLE OF YOUR THESIS Hypothesis (es) . 12 Type of Research Work . 13 Deliverables .. 13 Delimitations of Your Research 13 Limitations of Your Research 13 Literature Review .. 15 Introduction .. 15 Summary of Existing Research Studies .. 15 Summary of Existing Theories 15 Summary of Existing Methods 15 Literature Review Relevance to Research Project .. 15 Key Points and Conclusions Derived from Literature ReviewHarrisburg GRAD 695 Management of Identity Access in Information Security Research . 15 Research Design and Methodology . 18 Proposed Solution Overview .. 18 Research Design Overview .. 18 Research Questions and Objectives to be Addressed . 18 Research Design Setting 18 Method of Data Sourcing and Data Collection .. 18 Participants 18 Data Analysis Approach 18 4 TITLE OF YOUR THESIS Key Outputs and Deliverables .. 18 Ethical Considerations 18 Conclusion, Summary and Recommended Future Work . 21 References 22 5 TITLE OF YOUR THESIS List of Figures Figure 1. Research Design Methodology Overview .. 18 6 TITLE OF YOUR THESIS List of Tables Table 1. Definition of Terms .. 9 7 TITLE OF YOUR THESIS Relationship to Curricular Practical Training (CPT) Overview of CPT Assignment Proposed Research and Application to Capstone Project Relationship to ISEM Additional CPT Section Guidance Delete All This When No Longer Needed If you are not a CPT student, this page will simply consist of the following statement: NO CPT. If you are a CPT student, this information is required. This chapter should be no more than one (1) page of text. CPT students please describe in three (3) paragraphs the following: 1. An overview of your CPT assignment. Harrisburg GRAD 695 Management of Identity Access in Information Security Research Use the journalistic who, what, where, when, why approach here. 2. Highlights of your Proposed Research and its application to your Capstone project. 3. How will this research contribute to your studies and enrich your CPT experience? Guidance Article(s) NA Example(s) NA When Due? Submit with: Midterm Draft Updated in Midterm Final submission Updated in Final Draft Updated in Final Submission 8 TITLE OF YOUR THESIS Introduction Research Overview (Introduce your general topic / problem area and your planned research approach in a way that everyone can understand. Assume this topic is new to the reader.) Definition of Terms (Fill in the provided Table. Define all terms that may be new or unknown to reader. Assume reader will not know your terms and acronyms) Table 1. Definition of Terms Term Definition Background (Provide a background, historical context and general overview of your selected research topic) Problem Description (Introduce the problem that you intend to research. This must be specific, not generic.) Significance of Research (Why is it important to solve this problem and write this Thesis? Why is this research important? What gaps in research, literature, methodology or theory will it fill? Provide motivation for the problem you intend to research and how it relates to the larger field of study). Theoretical Framework or Construct 9 TITLE OF YOUR THESIS (Briefly introduce the processes, methodologies, and knowledge areas that will be the focus of your research. This is introduction only, as this information will be provided in much more detail in a later chapter). Ethical Considerations (Briefly introduce whether or not there are any ethical research considerations. All research must be done in an ethical manner.Harrisburg GRAD 695 Management of Identity Access in Information Security Research For example, human subjects cannot be used without their consent. Animals can only be used with special care. Do you have such risks or not? 10 TITLE OF YOUR THESIS Overview of Remaining Thesis Chapters For the benefit of the reader, provide a summary of each chapter that comes after the Introduction chapter. Identify each chapter by its formal Table of Contents title, and summarize its contents for the reader. This should be perhaps 2-3 paragraphs and not a bulleted list). Additional Introduction Chapter Guidance Delete All This When No Longer Needed General Introduction chapter Guidance (remove all this once Introduction is written): The Introduction is generally started after Problem Identification and initial Literature Review and modified throughout the writing of the research thesis. Your Introduction should: Clearly define why it is important to write this thesis / solve this problem. Provide motivation for people to read your thesis. Why should the reader care? Provide the big picture. Describe the overall problem you will be researching in GRAD695 and how it relates to the larger field of study in its topic area. Introduce the problem and research approach in a way that everyone can understand. Focus on the problem, that is, the processes, methodologies, and knowledge areas that will be the focus of your research. Do not focus on technology or business operations. a specific operational process Provide definitions of commonly used terms. Guidance Article(s) Introductions: The Writing Center University of North Carolina at Chapel Hill Example(s) Culture, Communication & Leadership for Projects in Dynamic Environments When Due? Midterm Draft Updated in Midterm Final Updated in Final Draft Updated in Final Submission 11 TITLE OF YOUR THESIS Problem Statement and Justification Problem Statement (Provide a simple, clear and concise statement of your research problem. This must be specific e and measurable. It cannot be a high-level or generic statement). Harrisburg GRAD 695 Management of Identity Access in Information Security Research Purpose Statement (Summarize the primary purpose of your planned research. To achieve this primary purpose, summarize your research Strategy, Research Design, planned method of data collection, planned method of data analysis, data variables and the reasons for choosing your research design). Note that all this will not be known early in the research process.) Problem Justification (Justify why your selected problem should be researched. Why has it not yet been studied? Why is it important to study at this time? Why should the reader care?) Research Questions and Objectives (What is your primary research question, and any secondary questions you intend to answer? List and explain them here). Note that these Questions and Objectives must then then be reflected in your Research Design and Methodology and then again in your Results and Findings in your 699 course. These must all tie together. These three chapters are connected by our Research Questions and Objectives. Hypothesis (es) (State any / all Hypotheses that you intend to test. This may not apply to all research. However, if you state hypothes(es), then they must absolutely drive your Research Design and Methodology and then must be answered in your Results and Findings). 12 TITLE OF YOUR THESIS Type of Research Work (Summarize whether your research will be Quantitative, Qualitative or Mixed Methods. Details on these types will be discussed in class). Deliverables (Summarize your expected Deliverable(s). These are produced by executing your Research Design and Methodology process steps. Your Deliverables will contain your Results and Findings).Harrisburg GRAD 695 Management of Identity Access in Information Security Research Delimitations of Your Research (Delimitations may include demographic or other forms of boundary). Limitations of Your Research (Any form of constraint, including time, financial or other should be recognized. What will your Thesis NOT address?) Additional Problem Statement and Justification Chapter Guidance Delete All This When No Longer Needed In your Problem Statement and Justification chapter, you should provide: 1. Clear statement of the problem(s): What is the question that you need to answer? a. You must think about your primary research question, and any secondary questions that arise from it. b. Is your research question specific, clear, concise and focused? It must be. 2. Why your defined problem must be solved (Justification) 3. Hypothesis (if any) to be tested- articulated hypotheses and/or questions. This may not apply to all research. 4. Limitations: What will this thesis NOT do? 13 TITLE OF YOUR THESIS Additional Problem Statement and Justification Chapter Guidance Delete All This When No Longer Needed 5. What will be deliverables? Be specific. 6. Type of work: primary research that you complete using selected methodologies; secondary research relying on completed research. 7. A high level diagram of the research work is highly useful (what are the inputs, research deliverables, what are the outputs) Guidance Presentation How to Write a Research Question GMU Purdue OWL How to Write a Problem Statement Example(s) When Due? Sections 1 and 2 submitted with Midterm Draft and Midterm Final Sections 3 through 7 written and integrated with Sections 1 and 2 for Final Draft and Final Submission. 14 TITLE OF YOUR THESIS Literature Review Introduction Summary of Existing Research Studies Summary of Existing Theories Summary of Existing Methods Literature Review Relevance to Research Project Key Points and Conclusions Derived from Literature Review Additional Literature Review Chapter Guidance Delete All This When No Longer Needed General Literature Review chapter Guidance (remove all this once Introduction is written): Expect this to be 4-10 pages in length. Do not count pages. A good place to start is with the topic Literature Reviews from the Literature Review Assignment.Harrisburg GRAD 695 Management of Identity Access in Information Security Research The early research can provide a foundation for locating articles, journals, white papers, books about your chosen topic and the research question. Conduct additional research for your Literature Review. It is recommended that you identify, review and digest 2-3 new research articles every week that support your analysis of the initial literature reviews or which provide additional depth to your understanding. First pick a Topic. Then, you must do the following: o Craft a set of keywords and execute multiple keywords searches across multiple research sources. Expect this to be a time-consuming and potentially frustrating experience. Not every article that you find will make its way into your Thesis. 15 TITLE OF YOUR THESIS Additional Literature Review Chapter Guidance Delete All This When No Longer Needed o Review, understand and critique existing literature and related theories and methodologies, What research has come before you? o Discover the gaps in existing literature, theories and methodologies. These gaps typically provide the best areas for your research focus. Conduct additional research and determine whether your topic is too narrow or too broad and requires a new focus. Research typically starts out too broad and too high level and needs to be refined. Do not get discouraged, as this is part of the research process. After conducting additional research, write your Literature Review following the guidance articles to compare and contrast research from your selected researchers. A Literature Review is not a listing or summary of research articles but a thoughtful assessment that can include the following: o How do the authors outline the literature? You may wish to include a table, chart or diagram to show the framework(s) used to organize or compare the research. Harrisburg GRAD 695 Management of Identity Access in Information Security Research o What lens will you use to focus your research? You may agree or disagree and contrast the topic breakdown done by the authors of the articles or literature reviews. o Based upon your reading of the literature, why has the problem not been solved or why has the primary question not yet been answered? What gaps remain for future research? Guidance Literature Reviews The Writing Center at University of North Carolina at Chapel Hill 16 TITLE OF YOUR THESIS Additional Literature Review Chapter Guidance Delete All This When No Longer Needed Example(s) Literature Review on Challenges of Virtual Team Leadership Culture, Communication & Leadership for Projects in Dynamic Environments When Due? Midterm Draft Updated in Midterm Final Updated in Final Draft Updated in Final Submission 17 TITLE OF YOUR THESIS Research Design and Methodology Proposed Solution Overview Research Design Overview The proposed research process is illustrated in Figure 1. The following paragraphs summarize this process. Phase 2 Phase 1 Step 1 Comprehensive Review and Characterization Of Standards and Processes Characterize small commercial enterprise and specific SE Needs Characterization Gaps Needs Required SE Characteristics Phase 3 Develop SE Org. Readiness Criteria SE Readiness Criteria Phase 4 Step 2 Gap Analysis of Standards Relative Strengths and Weaknesses Develop Process Model f Get a 10 % discount on an order above $ 100 Use the following coupon code : NURSING10