Reference no: EM132411986
Assignment - Research Report
Objective(s)
This assessment item relates to the unit learning outcomes as in the unit descriptor. This assessment is designed to improve student presentation skills and to give students experience in researching a topic and writing a report relevant to the Unit of Study subject matter.
INSTRUCTIONS
Research paper for IT security which is related to Risk management
Assignment 2 - Research Study - Individual Assignment
For this component you will write a report or critique on the paper you chose from Assignment 1.
Your report should be limited to approx. 1500 words (not including references). Use 1.5 spacing with a 12 point Times New Roman font. Though your paper will largely be based on the chosen article, you should use other sources to support your discussion or the chosen papers premises. Citation of sources is mandatory and must be in the IEEE style.
Your report or critique must include:
Title Page: The title of the assessment, the name of the paper you are reporting on and its authors, and your name and student ID.
Introduction: Identification of the paper you are critiquing/ reviewing, a statement of the purpose for your report and a brief outline of how you will discuss the selected article (one or two paragraphs).
Body of Report: Describe the intention and content of the article. If it is a research report, discuss the research method (survey, case study, observation, experiment, or other method) and findings. Comment on problems or issues highlighted by the authors. Report on results discussed and discuss the conclusions of the article and how they are relevant to the topics of this Unit of Study.
Conclusion: A summary of the points you have made in the body of the paper. The conclusion should not introduce any ‘new' material that was not discussed in the body of the paper. (One or two paragraphs)
References: A list of sources used in your text. They should be listed alphabetically by (first) author's family name. Follow the IEEE style.
Article -A Critical Analysis of Software Risk Management Techniques in Large Scale Systems by MARUF PASHA, GHAZIA QAISER, AND UROOJ PASHA
|
How many performance obligations are in this contract
: Chai is obligated to pay Handler the $2,000,000 upon the delivery and installation of the equipment. How many performance obligations are in this contract
|
|
What is the nature of the gain or loss
: Sol purchased land as an investment on February 12, 2017 for $85,000. On January 31, 2018, Sol sold the land for $90,000 cash. What is the nature of the gain
|
|
What would you advise Todd to do
: What would you advise Todd to do? Does Todd's action affect "earnings quality"? If so, how?, Is your advice affected by the attitude of the auditors
|
|
How does this help determine what we track in accounting
: The reason is simple, these three points are basis for determining the present value of the company. How does this help determine what we track in accounting
|
|
Critical analysis of software risk management techniques
: Identification of the paper you are critiquing/ reviewing, a statement of the purpose for your report and a brief outline of how you will discuss the selected
|
|
How would the amount of the deduction be determined
: Will Woods receive a deduction for this transaction? How would the amount of the deduction be determined
|
|
What is impact on net income over the two accounting periods
: Assuming that the purchased parts became a part of the cost of goods sold in 2017, What is the impact on net income over the two accounting periods
|
|
Calculate allowable deductions for the home office
: If Dennis' gross revenue after deducting supplies for his business is $13,800, calculate his allowable deductions for the home office
|
|
Compute the total amount capitalized for the patent
: Cayman paid $75,000 for legal fees in a successful defence of the patent. Compute the total amount capitalized for the patent through March 31, 2020
|