What is the new technology

Assignment Help Computer Network Security
Reference no: EM13949342

Question:

The topic is same as before CONTACTLESS BIOMETRICS. this is the extension of the 1st assignment. in this current assignment, it is the LITERATURE REVIEW.

TASK 1 Literature Review

1. Write a Literature Review for your Capstone Topic following a set structure. The Literature Review is a critical examination of the most relevant, recent and scholarly research on the topic area that is not just a summary of the articles you have read on done in Topics 1 to 5.

2. For Group Work OPTION teams only: Assessment Item 3 Literature Review is done INDIVIDUALLY by ALL students and will be combined and included in the final Group Capstone Project Report.

3. Ensure that the Literature Review submitted by you is your own work and has not been submitted elsewhere and comply with the University's requirements for academic integrity.

4. You can get help in Writing a Literature Review from the ITC571 Modules tool and other study advices and tips from:

1. Study Resources (PDF files to download): https://student.csu.edu.au/study/resources

2. APA style Referencing from https://student.csu.edu.au/study/referencing-at-csu.

3. The CSU Library website for LibGuides in Information Technology, Computing and Mathematics at https://libguides.csu.edu.au/cat.php?cid=66969

4. EndNote Bibliographic software and tutorials LibGuide at https://libguides.csu.edu.au/endnote

5. Review the emerging technology (use internet, magazines, news articles, online databases, eBooks) and submit a 2000-word review of the literature on your topic.

6. Templates are available in the Resources section or from your lecturer to help guide you through the process of extracting information from a collection of articles.

7. A good place to start a collection of articles in your review of the literature is via the PRIMO search tool located on the CSU Library website athttps://www.csu.edu.au/division/library

As an example, the Capstone Topic PRIMO search on a topic like "near field communication applications" returned the following list of very recent journals, books, conference proceedings and eBooks related to the Topic:

Library Resources

Information Technology Journal Databases: https://www.csu.edu.au/division/library/find-info/databases/subject/infotech

Information Technology & Computing LibGuides : https://libguides.csu.edu.au/itc

The following questions may be useful while reviewing the topic:

1. What is the new technology?

2. What does it do and what are the special features it has?

3. When is it coming out in the market and how much will it cost?

4. What industry will the new technology affect? (Medical, agricultural, computer, business, etc....).

5. In your opinion, will the new technology be beneficial to society? Why or why not.

6. What did you learn from a critical analysis of your sources of information on this new technology?

TASK 2 Originality Report and Questions

1. Generate a Turnitin originality report and submit this report via EASTS;

2. Answer the following questions to interpret the Turnitin originality report. The questions can be found through the following link:https://www.academicinternational.org/teaching/turnitin.pdf

3. Submit your question answers via EASTS.

Because the sophisticated use of sources involves a complex set of research, critical thinking, and writing skills, you should expect to take several years to master them. Turnitin can be a helpful tool in this developmental process. You should use your originality reports as feedback on a first draft so that you can improve your use of sources before submitting the final draft for marking.

Interpreting the Turnitin Originality Report:

After you submit your draft to Turnitin for self-checking, you should look carefully at the originality report so that you can improve on your use of sources. Your essay will be on the left side of the screen, and the matching colour-coded sources will be listed on the right. Then you can make the necessary changes to your essay before you submit the final draft for marking.

What does a well written literature review contain?

That is a research topic on its own, however I recommend the list of SIX structural elements below are found in most well written literature reviews:

1. Interpretation and evaluation of an overview of recent trends in emerging technologies and innovation;

2. Evidence of literature searches and critical analysis of the literature in the chosen capstone topic;

3. Critical reflection and synthesis of complex information, problems, concepts and theories in the chosen topic;

4. Original opinion on the benefits of your capstone project to others;

5. Reflective comments on what was learnt from a review of the literature;

6. Use of correct citations and referencing conforming to recognised referencing format.

The Checklist for the literature review elements can be used as a quality check as you write:

Content Elements

• Coverage of topic

• Depth of discussion

• Development of argument and reasoning

• Selection of literature

Writing Style Elements

• Structure of review

• Technical competence

• Use of citations and quotations

• Referencing

Verified Expert

Reference no: EM13949342

Questions Cloud

How corporate valuation model and adjusted present value : Explain how the corporate valuation model and the adjusted present value (APV) method are used to estimate the value of a target company. If someone did a complete and careful analysis of a given target using both of these methods, would they produce..
What is the appearance of the relation result : In terms of the relations shown below, what is the appearance of the relation RESULT after executing each of these instructions?
Calculate operating cash flow if earnings before interest : If Earnings Before Interest and Taxes (EBIT) is $93,000, calculate Operating Cash Flow if Sales is $350,000, Cost of Goods Sold (COGS) is $140,000, Fixed costs is $43,000, Selling, General, Administrative Expenses (SGA) are $28,000, Depreciation is $..
What is the economic ordering quantity for chips : Aberwald Corporation expects to order 126,000 memory chips for inventory during the coming year, and it will use this inventory at a constant rate. Fixed ordering costs are $175 per order; the purchase price per chip is $25; and the firm's inventory ..
What is the new technology : What is the new technology - what does it do and what are the special features it has and when is it coming out in the market and how much will it cost?
What percentage of known offenders involved in hate crimes : What percentage of known offenders involved in hate crimes are White? Which of the following is a characteristic of a street gang, as opposed to a drug gang
What is meant by put-call parity : Shares of MegaKimmel, a producer and marketer of caraway seeds, is selling for $50. A European-style call option with a strike price of $55 and a maturity of three months is selling at $2. Assume the continuously compounding risk-free annual rate is ..
President obama''s administration : 1. After almost seven years of President Obama's administration, how has the U.S. economy's "variety" changed?2. Has President Obama's promise to "transform America" included a  change in the "variety of capitalism" in the U.S.?
Legally restricted in their declaration of dividends : Boards of directors may be legally restricted in their declaration of dividends if: A. cash must be borrowed for the dividend payment. B. dividends have increased substantially over a short period of time. C. the dividend would create a situation of ..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Information and communication technology infrastructure

In this Group Project, assume that you and the members of your group are top managers of a big international company spread over several continents. You decide to rebuild/expand your company's Information and Communication Technology infrastructur..

  Overview of information security fundamentals

This assessment task is based on the following topics discussed in the subject: the overview of Information security fundamentals, security threats, cryptography, malicious software and its countermeasures, operating system security and software ..

  What are the pros and cons of each method

What are the pros and cons of each method? If you are the security officer of your company and want to set up a key distribution mechanism, which one would you choose to use?

  Hypothetical business engaged in e-business

Provide an executive briefing to middle and upper management on the topic of cryptography and how it should be applied in this environment

  Root certificate authority and an intermediate ca

Is a cryptographic hash function/digest considered encryption - explain three vulnerabilities from the latest Open Web Application Security Project (OWASP).

  Explore traffic behavior when designing a network

Why is it important to explore traffic behavior when designing a network? What problems could arise if you do not understand traffic behavior when you build a new network or upgrade a network?

  Explain common organizational security threats

Create either a PowerPoint presentation, or a training manual, that will help get the team to think about security. This training document should cover the following key areas: 1. Explain common organizational security threats (avenues of attack).

  Description of the kerberos authentication protocol

Give your general description of the Kerberos authentication protocol and explain the term: Authenticator used in the Kerberos authentication protocol.

  Why are background checks important to information security

Be sure to list your two required references at the end of your post. References must be in APA citation format. Answer the following questions below must be a minimum of 300 words combined. Why are background checks important to information securi..

  Nap to reduce security risks

You discover that many of your company's customers have been responsible for introducing viruses and malware into the company network via the Internet

  How do concepts like secure socket layer

How do concepts like secure socket layer

  Question about program consistency

Please provide an example of a event where consistency has caused too many problems? Is there a program you have used in your own work environment where consistency has caused problems?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd