Topic selection and research paper requirements

Assignment Help Basic Computer Science
Reference no: EM13719363

Topic Selection and Research Paper Requirements

Prior to writing your paper, you may choose to submit a short research topic proposal in the form of a short paragraph, to your instructor. If you choose to do so, please email a copy of your paragraph description of your Research Paper topic proposal, on or before Sunday June 9. If I do not receive it by that date I may not have time to adequately review and comment on your proposal. Send it to: [email protected] with a copy cc'ed to my private email, [email protected] by 11:59PM (EST). This is optional and is not mandatory and is totally voluntary. If you choose to submit your proposed research paper topic to me please do so by email. Do not attempt to submit it to the assignments folder because this is not considered as an assignment per se. In addition the assignments folder has not been setup to cater for this as a submission.

The purpose of feedback is to provide comments on the appropriateness of your proposed topic's coverage, (both breadth and depth), as well as your research approach, sufficiently early in the course to allow for topic revision if necessary.
The topic proposal can be a short paragraph or a full page abstract stating what research question will be answered (or what problem will be solved) by the analysis your paper proposes to perform. In other words your topic proposal should define the focus of the paper by stating a question or describing a problem to be analyzed in the Information Assurance domain. It should also explain what types of resources and references will be used to perform the analysis to answer this question or solve the stated problem. Note that the references or sources found early may not be the same references you choose to use in the final paper. An adequate literature search will include at least five (5) reputable scholarly sources such as those available through the UMUC online library. It is anticipated that reputable Internet sources will also be helpful and appropriate.

Your Research Paper needs to focus on one or more themes covered in this INFA 670 capstone course. Being a capstone course it gives you an opportunity to incorporate knowledge from other INFA courses which you have taken. It needs to be strongly emphasized that papers must not be "recycled" from these previous INFA courses, even if written by you. To do so is unacceptable and will result in a "zero grade" for the assignment.

The research paper should be focused on one or more specific topic areas found in the INFA 670 Course Schedule which is found under the Syllabus tab in WebTycho. You are required to research a specific issue in your chosen topic area concentrating on analyzing the issue and evaluating the available solutions to the issue. The paper needs to discuss the corresponding benefits and limitations of these solutions and then provide recommendations.


For example; Session 4 covers vulnerability analysis in five subheadings:

Vulnerability Analysis

  • Penetration Studies
  • Vulnerability Classification
  • Frameworks
  • Certification of Information Systems
  • Accreditation of Information Systems


Your research paper could focus on an issue that spans one or more of the above subheading topics. Your task would be to analyze your chosen specific issue in Vulnerability Analysis corresponding to your chosen subheading topics and then produce a research report on same.

The reference to Session 4 above is for example only. It does not mean you must base your research paper on the Session 4 subtopics, although one could choose to do so. Feel free to focus your research paper on other Sessions (Sessions 1,2,3,5,7,8,9,10,11) which may cover issues and topics which are of more interest or perhaps more applicable to your present endeavors.

Alternatively you may find it appropriate to focus your research on an issue spanning two or more session topics. As a hypothetical example, you could conceivably analyze a commercial software tool (Session 10) targeted at performing software verification and validation (Session 9).
Your Research Paper must demonstrate graduate-level writing ability and comply with the format requirements of the Publications Manual of the American Psychological Association (5th edition). Careful attention should be given to source citations, proper listing of references, and the presentation of tables and graphs. Be sure to carefully cite (using correct APA-Style in-line citations) all sources of information in your paper.
UMUC policies regarding plagiarism will apply to the Research Paper as well as all other deliverables in this course. Plagiarism is the intentional or unintentional presentation of another person's idea or product as one's own. Plagiarism includes, but is not limited to the following: copying verbatim all or part of another's written work; using phrases, charts, figures, illustrations, or mathematical or scientific solutions without citing the source; and paraphrasing ideas, conclusions, or research without citing the source. Students can avoid unintentional plagiarism by carefully adhering to accepted scholarly practices. Notes taken for papers and research projects should accurately record sources of material to be cited, quoted, paraphrased, or summarized, and papers should acknowledge these sources in footnotes. The penalties on plagiarism include a zero or a grade "F" on the work in question, a grade "F" in the course, suspension with a file letter, suspension with a transcript notation, or expulsion. Please refer to UMUC policies concerning action in cases of confirmed plagiarism.
A final note on source citations and the use of reference material in your research paper: It is expected that much of the information you put in your paper will relate to topics which are new to you. For this reason it is also expected that you will rely heavily at times on material found through references discovered in your research. It is essential that you give proper attribution to these sources of information. You should not quote extensively from your sources, but instead should express the ideas found in your own words, applying them to the specific points you are making in your paper. Short word-for-word excerpts are acceptable, but should always be placed in quotation marks to clearly indicate a verbatim use of source material.
Your paper should be between 12-15 pages, double-spaced, exclusive of cover, title page, table of contents, appendices and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. Submit the paper in your Assignment Folder prior to the submission deadline.

 

Reference no: EM13719363

Questions Cloud

Explain how it affects the purchase process : Describe the model of consumer buyer behavior. Providing a list of the steps or a graphic of the model is not adequate, as you must explain how the process works in the real world using your own words.
List the strengths and weakness of the budgeting : Write a detailed memo to persuade the CEO to use absorption costing Income statement approach for internal control purpose and List the strengths and weakness of the budgeting
Adiabatic mixing chamber operating at steady state : Consider an adiabatic mixing chamber operating at steady state into which steam enters with quality of 0.9. Water enters through a separate inlet at 300C. At the exit the temperature is 1500C and mass flow rate is 2 kg/s. The pressure in the mixing c..
Final equilibrium temperature of the metal bar and the water : A 1.2-lb metal bar initially at 2100oR is removed from an oven and quenched by immersing it in a closed tank containing 28 lb of water initially at 620oR. Each substance can be modeled as incompressible. An appropriate constant specific heat value fo..
Topic selection and research paper requirements : Prior to writing your paper, you may choose to submit a short research topic proposal in the form of a short paragraph, to your instructor. If you choose to do so, please email a copy of your paragraph description of your Research Paper topic p..
Pressures at beginning and end of isothermal expansion : Air in a piston cylinder assembly undergoes a Carnot power cycle. The isothermal expansion and compression processes occur at 1400 Kelvin and 350 Kelvin, respectively. The pressures at the beginning and end of the isothermal compression are 100 kPa a..
Plot the mass flow rate and the entropy production rate : Steam at 550 lbf/in.2, 70 oF enters a turbine operating at steady state and exits at 1 lbf/in.^2. The turbine produces 500 hp. For the turbine, heat transfer is negligible as are kinetic and potential energy effects. Determine the quality of the stea..
What are the five different approaches to risk : What are the five different approaches to risk? What are the pros and cons of each strategy? Support your answer with solid reasoning class is cmgt 400
Similar to the rolling direction of anisotropic sheet metal : A drawn, thin -walled tube has plastic (orthotropic) anisotropy. The axial direction of the tube is similar to the rolling direction of anisotropic sheet metal. The tube diameter is 3 inches and the wall thickness is 0.040 inch.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Shortest path between each pair of nodes using floyd''s metho

find the shortest path between each pair of nodes using Floyd's method

  Find on what day a specific date falls

1: Find on what day a specific date falls. 2: Display the twelve month calendar for a given year. Option: Depending on the given option, the program asks user to enter valid mm dd yyyy or just yyyy and call the necessary functions to print out the..

  What purposes do cpus, memory and i-o devices

What purposes do CPUs, memory and I-O devices individually serve in a computer system

  Create direct-mapped data cache for the byte offset

Create the 128KB direct-mapped data cache which uses a 32 bit address and 16 bytes per block. Compute the following: How many bits are utilized for the byte offset?

  What is incremental analysis how is it used by management

1. Our lecture states that relevant costs can also be viewed as avoidable costs. What does this mean? This is a very difficult concept, so help your classmates understand it!2. What is incremental analysis? How is it used by management?

  Why does the label control that contains your name print

why does the label control that contains your name print above the page number?

  Create any required pointers needed to complete insertion

Assume that the list pointed to by startPtr is maintained in alphabetical order. (Note: you do not know what is in the list, only that it is maintained in alphabetical order.)

  What is the order of the leaf node

The order of a leaf node in a B+ tree is the maximum number of pairs it can hold. Given that the block size is 1K bytes, data record pointer is 7 bytes long, the value field is 9bytes long and a block pointer is 6bytes long, what is the order of t..

  Acilisis, lacinia, curabitur egestas

Acilisis, lacinia, curabitur egestas, lorem, risus. Class Ac amet laoreet parturient, quam justo interdum hendrerit erat faucibus, facilisi scelerisque commodo, odio. Ligula conubia potenti, per praesent est egestas felis a facilisis potenti vehicula..

  Describe the complexities of auditing a cloud computing

1. explain the role auditing plays in the context of achieving trustworthy systems. 2. explain the complexities of

  Creating project organization in enterprise business

Organization structures generally used to create a project organization in an enterprise business environment.

  The method will return this count back to a variable in main

The method will return this count back to a variable in main

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd