Topic selection and research paper requirements

Assignment Help Basic Computer Science
Reference no: EM13719363

Topic Selection and Research Paper Requirements

Prior to writing your paper, you may choose to submit a short research topic proposal in the form of a short paragraph, to your instructor. If you choose to do so, please email a copy of your paragraph description of your Research Paper topic proposal, on or before Sunday June 9. If I do not receive it by that date I may not have time to adequately review and comment on your proposal. Send it to: [email protected] with a copy cc'ed to my private email, [email protected] by 11:59PM (EST). This is optional and is not mandatory and is totally voluntary. If you choose to submit your proposed research paper topic to me please do so by email. Do not attempt to submit it to the assignments folder because this is not considered as an assignment per se. In addition the assignments folder has not been setup to cater for this as a submission.

The purpose of feedback is to provide comments on the appropriateness of your proposed topic's coverage, (both breadth and depth), as well as your research approach, sufficiently early in the course to allow for topic revision if necessary.
The topic proposal can be a short paragraph or a full page abstract stating what research question will be answered (or what problem will be solved) by the analysis your paper proposes to perform. In other words your topic proposal should define the focus of the paper by stating a question or describing a problem to be analyzed in the Information Assurance domain. It should also explain what types of resources and references will be used to perform the analysis to answer this question or solve the stated problem. Note that the references or sources found early may not be the same references you choose to use in the final paper. An adequate literature search will include at least five (5) reputable scholarly sources such as those available through the UMUC online library. It is anticipated that reputable Internet sources will also be helpful and appropriate.

Your Research Paper needs to focus on one or more themes covered in this INFA 670 capstone course. Being a capstone course it gives you an opportunity to incorporate knowledge from other INFA courses which you have taken. It needs to be strongly emphasized that papers must not be "recycled" from these previous INFA courses, even if written by you. To do so is unacceptable and will result in a "zero grade" for the assignment.

The research paper should be focused on one or more specific topic areas found in the INFA 670 Course Schedule which is found under the Syllabus tab in WebTycho. You are required to research a specific issue in your chosen topic area concentrating on analyzing the issue and evaluating the available solutions to the issue. The paper needs to discuss the corresponding benefits and limitations of these solutions and then provide recommendations.


For example; Session 4 covers vulnerability analysis in five subheadings:

Vulnerability Analysis

  • Penetration Studies
  • Vulnerability Classification
  • Frameworks
  • Certification of Information Systems
  • Accreditation of Information Systems


Your research paper could focus on an issue that spans one or more of the above subheading topics. Your task would be to analyze your chosen specific issue in Vulnerability Analysis corresponding to your chosen subheading topics and then produce a research report on same.

The reference to Session 4 above is for example only. It does not mean you must base your research paper on the Session 4 subtopics, although one could choose to do so. Feel free to focus your research paper on other Sessions (Sessions 1,2,3,5,7,8,9,10,11) which may cover issues and topics which are of more interest or perhaps more applicable to your present endeavors.

Alternatively you may find it appropriate to focus your research on an issue spanning two or more session topics. As a hypothetical example, you could conceivably analyze a commercial software tool (Session 10) targeted at performing software verification and validation (Session 9).
Your Research Paper must demonstrate graduate-level writing ability and comply with the format requirements of the Publications Manual of the American Psychological Association (5th edition). Careful attention should be given to source citations, proper listing of references, and the presentation of tables and graphs. Be sure to carefully cite (using correct APA-Style in-line citations) all sources of information in your paper.
UMUC policies regarding plagiarism will apply to the Research Paper as well as all other deliverables in this course. Plagiarism is the intentional or unintentional presentation of another person's idea or product as one's own. Plagiarism includes, but is not limited to the following: copying verbatim all or part of another's written work; using phrases, charts, figures, illustrations, or mathematical or scientific solutions without citing the source; and paraphrasing ideas, conclusions, or research without citing the source. Students can avoid unintentional plagiarism by carefully adhering to accepted scholarly practices. Notes taken for papers and research projects should accurately record sources of material to be cited, quoted, paraphrased, or summarized, and papers should acknowledge these sources in footnotes. The penalties on plagiarism include a zero or a grade "F" on the work in question, a grade "F" in the course, suspension with a file letter, suspension with a transcript notation, or expulsion. Please refer to UMUC policies concerning action in cases of confirmed plagiarism.
A final note on source citations and the use of reference material in your research paper: It is expected that much of the information you put in your paper will relate to topics which are new to you. For this reason it is also expected that you will rely heavily at times on material found through references discovered in your research. It is essential that you give proper attribution to these sources of information. You should not quote extensively from your sources, but instead should express the ideas found in your own words, applying them to the specific points you are making in your paper. Short word-for-word excerpts are acceptable, but should always be placed in quotation marks to clearly indicate a verbatim use of source material.
Your paper should be between 12-15 pages, double-spaced, exclusive of cover, title page, table of contents, appendices and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. Submit the paper in your Assignment Folder prior to the submission deadline.

 

Reference no: EM13719363

Questions Cloud

Explain how it affects the purchase process : Describe the model of consumer buyer behavior. Providing a list of the steps or a graphic of the model is not adequate, as you must explain how the process works in the real world using your own words.
List the strengths and weakness of the budgeting : Write a detailed memo to persuade the CEO to use absorption costing Income statement approach for internal control purpose and List the strengths and weakness of the budgeting
Adiabatic mixing chamber operating at steady state : Consider an adiabatic mixing chamber operating at steady state into which steam enters with quality of 0.9. Water enters through a separate inlet at 300C. At the exit the temperature is 1500C and mass flow rate is 2 kg/s. The pressure in the mixing c..
Final equilibrium temperature of the metal bar and the water : A 1.2-lb metal bar initially at 2100oR is removed from an oven and quenched by immersing it in a closed tank containing 28 lb of water initially at 620oR. Each substance can be modeled as incompressible. An appropriate constant specific heat value fo..
Topic selection and research paper requirements : Prior to writing your paper, you may choose to submit a short research topic proposal in the form of a short paragraph, to your instructor. If you choose to do so, please email a copy of your paragraph description of your Research Paper topic p..
Pressures at beginning and end of isothermal expansion : Air in a piston cylinder assembly undergoes a Carnot power cycle. The isothermal expansion and compression processes occur at 1400 Kelvin and 350 Kelvin, respectively. The pressures at the beginning and end of the isothermal compression are 100 kPa a..
Plot the mass flow rate and the entropy production rate : Steam at 550 lbf/in.2, 70 oF enters a turbine operating at steady state and exits at 1 lbf/in.^2. The turbine produces 500 hp. For the turbine, heat transfer is negligible as are kinetic and potential energy effects. Determine the quality of the stea..
What are the five different approaches to risk : What are the five different approaches to risk? What are the pros and cons of each strategy? Support your answer with solid reasoning class is cmgt 400
Similar to the rolling direction of anisotropic sheet metal : A drawn, thin -walled tube has plastic (orthotropic) anisotropy. The axial direction of the tube is similar to the rolling direction of anisotropic sheet metal. The tube diameter is 3 inches and the wall thickness is 0.040 inch.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Many-to-many relationship

What are some issues when working with a many-to-many relationship? Provide some examples.

  What are the advantages of using variables in a data type

What are the advantages of using variables in a data type? Substantiate your response with suitable examples. Justify your answers using examples and reasoning. Comment on the postings of at least two classmates with regard to whether you agree or..

  Explaining cash-drawer management concept

Explain in scholarly detail cash-drawer management concept and its relationship to departmental Budget vs. Actual control process.

  Why is it necessary to include both wmfc and mfc

Why is it necessary to include both WMFC and MFC in the logic expression for Counter_enable given in Section 5.6.2?

  Is the intersection of these languages context free

is the intersection of these languages context free? Why or why not?

  Write a java program that asks the user to enter a distance

Write a Java program that asks the user to enter a distance in meters. The program will then present the following menu of selections.

  Cloud provider secure large amount of capital

Few organizations tend to prefer operating expense models. whether Cloud providers will continue to secure large amount of capital....or will equity firms stop their funding?

  Describing equivalence relation

Let X = Z × (Z {0}). Define the relation  on X by (x, y)  (z, t) ↔ xt = yz for every (x, y), (z, t) ∈ X. Show that this is an equivalence relation on X.

  What is the output of the following program

What is the output of the following program?

  Based on the severity of a patient''s illness or injuries.

A triage software system that allows doctors to designate the order in which patients should be treated, based on the severity of a patient's illness or injuries.

  What advice would you give the managers of this company

What advice would you give the managers of this company? What would be the best storage system for their needs and why?

  . what options does atrium have for acquiring a new system

Atrium Bio-Medical Supply is a medium sized regional supplier of medical and laboratory equipment.Since starting 12 years ago,Victoria Dawn has built Atrium into a competitive supply company across several metro areas,but her growth potential is l..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd