Technology research paper Discuss different technologies that enforce or develop policy, that would be one direction to go. Research Paper Instruct

Technology research paper
Discuss different technologies that enforce or develop policy, that would be one direction to go.

Research Paper Instructions
The research paper will provide you with an opportunity to learn more about a topic of particular interest regarding information security systems. The technical focus and level of research for the chosen topic must be well planned and researched. With that in mind, be sure to choose a focused topic to ensure in-depth research.
The research paper will allow exposure to technical literature for exploration of the body of research as a whole, as well as practice navigating your way around it. Thus, a well-written paper will show your ability not only to research, but also to communicate via the written word. How well your document conforms to the required form and format will demonstrate your attention to detail and instruction.
Each paper must:
Have a length of 27503250 words (Note: the word count does not include words used in figures, tables, diagrams, or the bibliography)
Be formatted according to current APA standards including:
o A properly formatted APA Title Page including paper name, institution, class name and paper date.
o A Proper Title Page Header (Running Head: First 40 Characters of the paper title) and the page number (on the FIRST page).
o The name of the paper and page number on each additional page (no Running Head).
o Section Headers (i.e. First Level Headers) which are bold and centered
o Indented paragraphs for each paragraph.
o No contractions or use of personal pronouns such as You, me, your (except in the Conclusions page)
o Proper APA formatted in-text citations and Bibliography
Include figures, tables, or diagrams, where appropriate (Note: the words in the figures, tables, or diagrams are not part of the word count)
Include an in-text citation whenever the source to which you refer is changed
Attribute quotes to the source obtained, but quotes may not make up a significant portion of the body of the text
Include at least 5 sources for citation, 2 of which must be peer-reviewed journals.
Use an in-text citation to support any opinion that is not otherwise known as a fact by your audience or by the general public.
o For example, if you state: all IT Systems should be reviewed yearly as a best practice you need to support that with a citation. Such as According to (source), all IT systems should be reviewed yearly
o As a graduate student, you are not yet considered an expert in your field but are striving to become one by your degree.
o If your statement is a known fact such as Computers are designed for processing electronic information or IT Security is important then you do not need to cite as your audience will likely agree that this is a fact.
o When in doubt, cite! J

Don't use plagiarized sources. Get Your Custom Assignment on
Technology research paper Discuss different technologies that enforce or develop policy, that would be one direction to go. Research Paper Instruct
From as Little as $13/Page

Each paper must include these 4 sections in this order as the first level sections:
1. Research Objectives:
What specifically do you want to learn about or prove as you do this research?
a. List the research topics that you included as at least 34 bullets in the Research Paper: Topic Proposal/Outline at the top of this section. This list is to appear as the first section in your paper.
b. After placing your bulleted list on the paper, you must now explain those bullet points as separate paragraphs placed directly after the complete list rather than inline with your list.
c. For each bullet in the list above, devote a paragraph or two to the research topic to provide detailed information about that topic Including your research sources. (Note: your paper must be very focused to allow in-depth research in so few words. ) and remember to include biblical integration as you are able.
d. The research topics are stated as bullets in this first section to help sharpen your focus and hopefully ensure that focus is maintained as the paper develops. But are only to serve as a guide for your paragraphs.

2. Literature Search Results:
What do other academic sources say about this subject?
a. This section will show the depth of your research.
b. All entries in your bibliography must be cited at least once in this section.
c. When detailing your literature search results, each declarative idea/concept (not each sentence) must be cited. You are stating other authors ideas and concepts and must provide the source from which they come.
d. Remember to link the results to Christian concepts via biblical integration.
e. Often this is the largest section of the paper. The time to state your own ideas will come in the following section.
3. Conclusions:
What have you learned from your research?
1. The purpose of this section is not simply to reiterate the previous sections, but for some thoughtful reflection. Now is the time to state your own conclusions. Dont forget to provide biblical integration on the topics when you state your conclusions.
2. In this section, each of the specific research questions you selected in the Research Paper: Topic Proposal/Outline must be restated and directly answered, even if the conclusion for an objective is uncertain. Doing so will help ensure that you have addressed all your original research questions. This, however, does not mean you are limited in this section to only answering your initial research questions. More often than not, your research will open new lines of thought that should be discussed.
3. Most poor grades are earned because this section does not include your conclusions, but only repeats data from the previous sections.
4. Bibliography:
1. Your bibliography section must show at least 5 sources you cited from with a minimum of two (2) peer-reviewed journals as sources.
2. Both the in-text citations and the accompanying bibliographic information must be in current APA format.
3. You must cite professionally edited, peer-reviewed sources. You are permitted to use webpages ONLY as secondary sources that support the aforementioned peer reviewed sources.
4. Do not cite the course texts, encyclopedias (online or otherwise), news sites, or articles from user-edited sources such as Wikipedia (however, this type of resource can be used for initial uncited research which will often lead you to acceptable sources).
5. You must use resources with a specific technical focus on your topic.
The Policy Research Paper: Final is due by 11:59 p.m. (ET) on Sunday of Module/Week 4.
The Technology Research Paper: Final is due by 11:59 p.m. (ET) on Friday of Module/Week 8.
Using the Tell Them Method
One of the most tried and true standards for good quality papers is to use the Tell Them model for crafting information. The model is broken out like this:
1. Tell Them what you are going to tell them. (introduction)
2. Tell Them about it (body of the paper)
3. Tell Them what you told them. (conclusions)
To put this into perspective of a research paper, in the introduction you will Tell Them What you are going to tell them. This gives the reader an idea of what to expect and helps setup a good structure for your paper. Obviously, dont use the words I am going to tell you but make it clear what the purpose of the paper is.
In the body of the paper, you will Tell them about it. Okay, you have explained at the beginning the topics you want to use and a broad overview of the information. Now you need to answer each piece of what you need to tell them. If you made it clear that you are going to talk about 4 specific things in the Tell Them what you are going to tell them section, then you should make sure to address all 4 items in detal.
Finally, in the conclusion of the paper, Tell Them What You Told Them. This means that you can re-iterate what you talked about (dont repeat it word for word but summarize the big ideas). Use this section to tie in each things you said you would talk about into a unified ending to your paper.
Why do this? It is scientifically proven that if information is repeated at least three times, the audience is most likely to remember it more quickly than if it was stated one time or less. If you give your readers a solid structure, follow it and drive it home, your audience will likely stay more engaged with your subject.

1

Information Technology Security Policy Framework

Trevor Henry

Liberty University

Professor Humphries

Information Technology Security Policy Framework

Introduction

The ever-increasing dependence on information systems as the major methods of carrying out company activities has resulted in the need to keep systems of that sort and the related data safely Nevertheless; several business organizations are still not in a position to address the security breaches through the current and the all-inclusive information security policy (Bhardwaj et al., 2016). Therefore, the overarching aim of this research is to give an outline of security policy in light of Information Technology as discussed below;

Objectives

To come up with a framework that can be utilized in establishing critical strategies and application policies.
To interpret the risks associated with the security of E-Business.
To provide a basic understanding of the results of a security policy on a business organization.

Questions

1. What is Information Technology Security Policy Framework and what is it designed to accomplish?
2. Should the Framework be applied to and by the entire organization or just to the IT department?
3. What are the main goals of information security?

Information Security Policy

According to Zeng et al. (2020), availability, authenticity, integrity, utility, confidentiality, and possession remain the fundamentals for security. Besides, achieving these fundamentals is not easy in a potential computing environment. The most appropriate strategy aimed at protecting the activities concerning computing is not straightforward since the current technology, which is the most secure, automatically fails in the future.

A Policy Framework for Interpreting Risk in E-Business Security

According to Garbowski et al. (2019), the life cycle of PFIRES is majorly made up of four phases, that is Assess, Plan, Deliver, and Operate where each phase has a clearly defined outlet formula that must be adhered to during the changeover to the next phase.

Phase 1: Assess

The overarching of this phase is to assess the suggested change in consideration of the current policy as well as the organizational environment. Its main results comprise a detailed assessment of the organization, the risks, decisions, and communication plan.

Policy Assessment

The policy assessment is carried out to evaluate the current policies, quality, guidelines, and approach.

Risk Assessment

This is aimed at identifying the company’s assets that should be protected and the possible challenges to the assets. It is further divided into:

Conduct Security Assessment: This aims at identifying the factors that may be threatened to result in insecurity of the information assets.

Assess Business Risk: This identifies the most secure assets.

Develop Security Recommendations: This identifies the best strategy for security.

Summarize Assessment Final Recommendations: The findings are finally analyzed to allow the management to make a final decision concerning the suggested change.

Phase 2: Plan

This phase facilitates the implementation of the suggested change. It is further divided into.

Policy Development

This involves coming up with or improving security plans and coming up with a security policy.

Requirements Definition

This includes a translation of the recommendations to the requirements as well as verification of the requirements.

Phase 3: Delivery

This refers to when the security policy is being implemented. It comprises of two steps:

Controls Definition

This includes the designation of infrastructure, determination of controls, evaluation of solutions, controlling the implementation, creating the implementation plan, building, testing, piloting, and deployment.

Phase 4: Operate Phase

This aims to oversee the controls established to protect the company. Moreover, an evaluation of the business and its technology trends are evaluated.

Monitor Operations

This step aims to administer the operations, communicate, conduct investigations, provide security services, ensure compliance, review trends, manage events, identify internal trends, and escalate to the assessment phase.

The Future

In consideration of management’s leading tools, communication among the senior and security management is facilitated by PFIRES. The business organization is expected to discern the instant benefit due to better communication. This area requires many improvements since this will benefit some areas such as organizational behavior and supply-chain. Better models and tools are required for the analysis and management of security gadgets. A study should also be carried out concerning how better the policy management requirements are met and the necessary improvements that should be established for future success.

References
Bhardwaj, A., Subrahmanyam, G. V., Avasthi, V., & Sastry, H. (2016). Design a resilient network infrastructure security policy framework. Indian Journal of Science and Technology, 9(19), 1-8.
Garbowski, M., Drobyazko , S., Matveeva, V., Kyiashko, O., & Dmytrovska, V. (2019). Financial accounting of E-business enterprises. Academy of Accounting and Financial Studies Journal, 23, 1-5.
Zeng, Z., Li, Y., Cao, Y., Zhao, Y., Zhong, J., Sidorov, D., & Zeng, X. (2020). Blockchain Technology for Information Security of the Energy Internet: Fundamentals, Features, Strategy and Application. Energies, 13(4), 881. CSCI 561

Research Paper Instructions

The research paper will provide you with an opportunity to learn more about a topic of particular interest regarding information security systems. The technical focus and level of research for the chosen topic must be well planned and researched. With that in mind, be sure to choose a focused topic to ensure in-depth research.

The research paper will allow exposure to technical literature for exploration of the body of research as a whole, as well as practice navigating your way around it. Thus, a well-written paper will show your ability not only to research, but also to communicate via the written word. How well your document conforms to the required form and format will demonstrate your attention to detail and instruction.

Each paper must:

Have a length of 27503250 words (Note: the word count does not include words used in figures, tables, diagrams, or the bibliography)
Be formatted according to current APA standards including:
A properly formatted APA Title Page including paper name, institution, class name and paper date.
A Proper Title Page Header (Running Head: First 40 Characters of the paper title) and the page number (on the FIRST page).
The name of the paper and page number on each additional page (no Running Head).
Section Headers (i.e. First Level Headers) which are bold and centered
Indented paragraphs for each paragraph.
No contractions or use of personal pronouns such as You, me, your (except in the Conclusions page)
Proper APA formatted in-text citations and Bibliography
Include figures, tables, or diagrams, where appropriate (Note: the words in the figures, tables, or diagrams are not part of the word count)
Include an in-text citation whenever the source to which you refer is changed
Attribute quotes to the source obtained, but quotes may not make up a significant portion of the body of the text
Include at least 5 sources for citation, 2 of which must be peer-reviewed journals.
Use an in-text citation to support any opinion that is not otherwise known as a fact by your audience or by the general public.
For example, if you state: all IT Systems should be reviewed yearly as a best practice you need to support that with a citation. Such as According to (source), all IT systems should be reviewed yearly
As a graduate student, you are not yet considered an expert in your field but are striving to become one by your degree.
If your statement is a known fact such as Computers are designed for processing electronic information or IT Security is important then you do not need to cite as your audience will likely agree that this is a fact.
When in doubt, cite!

Each paper must include these 4 sections in this order as the first level sections:

1. Research Objectives:

What specifically do you want to learn about or prove as you do this research?
a. List the research topics that you included as at least 34 bullets in the Research Paper: Topic Proposal/Outline at the top of this section. This list is to appear as the first section in your paper.
b. After placing your bulleted list on the paper, you must now explain those bullet points as separate paragraphs placed directly after the complete list rather than inline with your list.
c. For each bullet in the list above, devote a paragraph or two to the research topic to provide detailed information about that topic Including your research sources. (Note: your paper must be very focused to allow in-depth research in so few words. ) and remember to include biblical integration as you are able.
d. The research topics are stated as bullets in this first section to help sharpen your focus and hopefully ensure that focus is maintained as the paper develops. But are only to serve as a guide for your paragraphs.

2. Literature Search Results:

What do other academic sources say about this subject?
a. This section will show the depth of your research.
b. All entries in your bibliography must be cited at least once in this section.
c. When detailing your literature search results, each declarative idea/concept (not each sentence) must be cited. You are stating other authors ideas and concepts and must provide the source from which they come.
d. Remember to link the results to Christian concepts via biblical integration.
e. Often this is the largest section of the paper. The time to state your own ideas will come in the following section.
3. Conclusions:

What have you learned from your research?
1. The purpose of this section is not simply to reiterate the previous sections, but for some thoughtful reflection. Now is the time to state your own conclusions. Dont forget to provide biblical integration on the topics when you state your conclusions.
2. In this section, each of the specific research questions you selected in the Research Paper: Topic Proposal/Outline must be restated and directly answered, even if the conclusion for an objective is uncertain. Doing so will help ensure that you have addressed all your original research questions. This, however, does not mean you are limited in this section to only answering your initial research questions. More often than not, your research will open new lines of thought that should be discussed.
3. Most poor grades are earned because this section does not include your conclusions, but only repeats data from the previous sections.
4. Bibliography:

1. Your bibliography section must show at least 5 sources you cited from with a minimum of two (2) peer-reviewed journals as sources.
2. Both the in-text citations and the accompanying bibliographic information must be in current APA format.
3. You must cite professionally edited, peer-reviewed sources. You are permitted to use webpages ONLY as secondary sources that support the aforementioned peer reviewed sources.
4. Do not cite the course texts, encyclopedias (online or otherwise), news sites, or articles from user-edited sources such as Wikipedia (however, this type of resource can be used for initial uncited research which will often lead you to acceptable sources).
5. You must use resources with a specific technical focus on your topic.

The Policy Research Paper: Final is due by 11:59 p.m. (ET) on Sunday of Module/Week 4.

The Technology Research Paper: Final is due by 11:59 p.m. (ET) on Friday of Module/Week 8.

Using the Tell Them Method

One of the most tried and true standards for good quality papers is to use the Tell Them model for crafting information. The model is broken out like this:
1. Tell Them what you are going to tell them. (introduction)
2. Tell Them about it (body of the paper)
3. Tell Them what you told them. (conclusions)

To put this into perspective of a research paper, in the introduction you will Tell Them What you are going to tell them. This gives the reader an idea of what to expect and helps setup a good structure for your paper. Obviously, dont use the words I am going to tell you but make it clear what the purpose of the paper is.

In the body of the paper, you will Tell them about it. Okay, you have explained at the beginning the topics you want to use and a broad overview of the information. Now you need to answer each piece of what you need to tell them. If you made it clear that you are going to talk about 4 specific things in the Tell Them what you are going to tell them section, then you should make sure to address all 4 items in detal.

Finally, in the conclusion of the paper, Tell Them What You Told Them. This means that you can re-iterate what you talked about (dont repeat it word for word but summarize the big ideas). Use this section to tie in each things you said you would talk about into a unified ending to your paper.

Why do this? It is scientifically proven that if information is repeated at least three times, the audience is most likely to remember it more quickly than if it was stated one time or less. If you give your readers a solid structure, follow it and drive it home, your audience will likely stay more engaged with your subject.
Page 4 of 4

Leave a Comment

Your email address will not be published. Required fields are marked *