Problem Paramount to the success of your effort stated precisely address an important question advance knowledge.

Slides:



Advertisements
Similar presentations
Research skills. OUTLINE Mission and Vision What is Research? Ten Steps for Good Research Resources of Research Types of research Skills (Top_5 Skills)
Advertisements

1 Copyright © 2010 AQA and its licensors. All rights reserved. Introduction to the new specification GCSE Computer Science Paul Varey.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
Exit A key to the successful Science Fair Project A key to the successful Science Fair Project Goal The Researcher’s Strategy Results Method Hypothesis.
Writing Good Software Engineering Research Papers A Paper by Mary Shaw In Proceedings of the 25th International Conference on Software Engineering (ICSE),
Educational Research by John W. Creswell. Copyright © 2002 by Pearson Education. All rights reserved. Slide 1 Chapter 3 Identifying a Research Problem.
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
Neil McKenzie, Dedicon Multimedia training Packages by EUAIN.
IT in Education. No. of Students Enrollment Rate Annual Increase Employees Schools Budget General Education 1,100,000 98,7% 6% 47, US$M.
Research problem, Purpose, question
University of Jyväskylä – Department of Mathematical Information Technology Computer Science Teacher Education ICNEE 2004 Topic Case Driven Approach for.
Copyright © 2008 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. John W. Creswell Educational Research: Planning,
Science Inquiry Minds-on Hands-on.
Problem paramount to the success of your effort Must be stated precisely must address an important question must advance existing knowledge must be grounded.
The Characteristics of an Experimental Hypothesis
Section 2: Science as a Process
Planning an Applied Research Project Chapter 1 – Reading and Analyzing Research © 2014 John Wiley & Sons, Inc. All rights reserved.
The 2nd International Conference of e-Learning and Distance Education, 21 to 23 February 2011, Riyadh, Saudi Arabia Prof. Dr. Torky Sultan Faculty of Computers.
IEEE Systems Council VP Technical Operations Status; April 9, 2010 ieeesystemscouncil.org The SC has established a distinguished lecturer program. AESS.
WHEN, WHY, AND HOW SCIENCE RESEARCH IS REPORTED IMRAD.
William H. Bowers – Modeling Users: Personas and Goals Cooper 5.
Karolina Muszyńska. Reverse engineering - looking at the solution to figure out how it works Reverse engineering - breaking something down in order to.
Lecture Notes - Copyright © S. C. Kothari, All rights reserved.1 Summary Lecture CPRE 416-Software Evolution and Maintenance-Lecture 6.
Academy for Leadership & Development. Practicum Experience Program Components Developing an Individual Professional Development Plan (IPDP) Developing.
11 C H A P T E R Artificial Intelligence and Expert Systems.
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
INTRODUCTION TO PROJECT MANAGEMENT. WHAT IS A PROJECT? “A planned undertaking of related activities to reach an objective that has a beginning and an.
SCSC 311 Information Systems: hardware and software.
Development of Evaluation Tool (KPI) for e-Gov Development Veselin Stoyanov Management consultant, ICB 11 Mar 20111BG-KR eGov Experts Workshop:
BUSINESS INFORMATICS descriptors presentation Vladimir Radevski, PhD Associated Professor Faculty of Contemporary Sciences and Technologies (CST) Linkoping.
Learning outcomes for BUSINESS INFORMATCIS Vladimir Radevski, PhD Associated Professor Faculty of Contemporary Sciences and Technologies (CST)
© Copyright 2002 Frost & Sullivan. All Rights Reserved. U.S. Commercial Firewall Markets The Evolution Towards a Value-Added Feature “Firewall manufacturers.
Information Security Antipatterns in Software Requriements Engineering Miroslav Kis Presented by Liping Cai.
Identifying a Research Problem
Assessing the Frequency of Empirical Evaluation in Software Modeling Research Workshop on Experiences and Empirical Studies in Software Modelling (EESSMod)
WELNS 670: Wellness Research Design Chapter 3. The Problem: The Heart of the Research Process Chapter 3.
1 st and 2 nd. Learning Outcomes Students should be able to describe what research is and how it is defined, and explain the scope of business research.
Writing a Research Proposal 1.Label Notes: Research Proposal 2.Copy Notes In Your Notebooks 3.Come to class prepared to discuss and ask questions.
Developing Business/IT Solutions Chapter 12 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
The HMO Research Network (HMORN) is a well established alliance of 18 research departments in the United States and Israel. Since 1994, the HMORN has conducted.
Introduction to Earth Science Section 2 Section 2: Science as a Process Preview Key Ideas Behavior of Natural Systems Scientific Methods Scientific Measurements.
The Conceptual Framework: What It Is and How It Works Linda Bradley, James Madison University Monica Minor, NCATE April 2008.
Software Architecture Evaluation Methodologies Presented By: Anthony Register.
The Scientific Method. Objectives Explain how science is different from other forms of human endeavor. Identify the steps that make up scientific methods.
BSc Honours Project Introduction CSY4010 Amir Minai Module Leader.
Nursing Informatics NI.
1 Choosing a Computer Science Research Problem. 2 Choosing a Computer Science Research Problem One of the hardest problems with doing research in any.
m-Privacy for Collaborative Data Publishing
1 DIMENSIONS THAT CHARACTERIZE COMMUNITIES PREPARING FOR THE ANALYSIS OF SETTINGS WITHIN THE INSTITUTION.
Practical Research Paul D. Leedy Jeanne Ellis Ormrod
Practical Research Paul D. Leedy Jeanne Ellis Ormrod
© Copyright 2002 Frost & Sullivan. All Rights Reserved. U.S. Computational Software Markets for Discovery Phase Research in Life Sciences Need for Research.
CSM06: Information Retrieval Notes about writing coursework reports, revision and examination.
Copyright © 2011 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 1 Research: An Overview.
© Copyright 2004 Frost & Sullivan. All Rights Reserved. Product Lifecycle Management (PLM) Markets for Life Sciences Product Document Management (PDM)
BSc Honours Project Introduction CSY4010 Amir Minai Module Leader.
Formulating a research problem R esearch areas and topics.
© Copyright 2004 Frost & Sullivan. All Rights Reserved. U.S. Emerging Wireless Markets for Patient Care Healthcare's Continuous Need to Provide More for.
Are you a computer science enthusiast? Want to attend a conference within your reach?
© Copyright 2004 Frost & Sullivan. All Rights Reserved. World VoIP Monitoring Solution Markets Increased VoIP Deployments Spark Interest from Service Providers.
Types of Research Design and Exploratory Research.
Chapter 1 Computer Technology: Your Need to Know
Formulate the Research Problem
ISTE Workshop Research Methods in Educational Technology
The Steps into creation of research
The Starting Point: Asking Questions
Engineering Project Project Management Project Management.
CS385T Software Engineering Dr.Doaa Sami
Class Project Guidelines
Research Questions & Research Hypotheses
Presentation transcript:

Problem Paramount to the success of your effort stated precisely address an important question advance knowledge

How to formulate an important and useful research problem? First need to knowledgeable about your topic of interest –read the literature - most likely it will tell you what needs to be done attend professional conferences seek the advice of experts

Possible Avenues for Research Projects Address the suggestions for future research that other researchers have offered replicate a project in a different setting or with a different population apply an existing perspective to a new situation challenge other research findings

Towards Security Semantics in Workflow Management Gaby Herrmann, Guenther Pernul University of Essen In the past few years workflow management has become an important topic both, for the research community as well as for the commercial arena. One important topic which has been treated at less detail so far is providing security and integrity in workflow management. The main goal of this paper is to study what kind of security requirements need to be enforced during workflow management and which components of a workflow are effected by appropriate security measures.

Firewalls for Security in Wireless Networks U. Murthy Ciber Inc. O. Bukhres, W. Winn Purdue University E. Vanderdez Lucent Technologies Wireless computing is an area of computer science that has experienced much growth during the 1990's. The use of wireless networks allows users to access their home networks while separated from them by significant distances.

Due to its convenience and the decreasing cost of the needed hardware and software, wireless computing will continue to experience growth into the next century, both in the number of users and in the amount of data transmitted across wireless networks. Along with the growth of trusted users, there will also be an increase in the number of hackers, or rogue users. Due to financial, business, and privacy concerns, it will become increasingly important for system administrators to protect, from rogue users, hosts connected to wire-less networks.

One tool that may be used by system administrators is firewall technology. A firewall allows system administrators to implement strict access controls between the trusted internal network and the non-trusted external world. This paper discusses the firewall and other security tools used to provide security to the wired networks and offers a methodology to protect a wireless network. An Analysis of the proposed methodology and its functionality are also presented. Proceedings of the 31st Hawaii International Conference on System Sciences (HICSS'98), published by the IEEE Computer Society. Copyright (c) 1998 Institute of Electrical and Electronics Engineers, Inc. All rights reserved

Using Abuse Case Models for Security Requirements Analysis John McDermott and Chris Fox James Madison University The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge of security engineering. Market forces are driving software practitioners who are not security specialists to develop software that requires security features. When these practitioners develop software solutions without appropriate security-specific processes and models, they sometimes fail to produce effective solutions.

We have adapted a proven object-oriented modeling technique, use cases, to capture and analyze security requirements in a simple way. We call the adaptation an abuse case model. Its relationship to other security engineering work products is relatively simple, from a user perspective. Keywords: security, requirements, use case, UML

MoJo: A Distance Metric for Software Clusterings Vassilios Tzerpos University of Toronto R.C. Holt University of Waterloo The software clustering problem has attracted much attention recently, since it is an integral part of the process of reverse engineering large software systems. A key problem in this research is the difficulty in comparing different approaches in an objective fashion. In this paper, we present a metric that can be used in evaluating the similarity of two different decompositions of a software system.

Our metric calculates a distance between two partitions of the same set of software resources. We begin by introducing the model we use. Consequently, we present a heuristic algorithm that calculates the distance in an efficient fashion. Finally, we discuss some experiments that showcase the performance of the algorithm and the effectiveness of the metric. Keywords: software clustering, reverse engineering, metric

Stating Your Research Problem After you have figured out what you are going to focus your effort on, you must state the problem clearly and completely examples of poorly stated plans: –Security on wireless products –Metrics for large systems lack clarity, no reachable goals

Stating Your Research Problem Think through the feasibility of the project that the problem applies. –This study proposes to study the computer science programs of secondary schools in ….

Stating Your Research Problem Say precisely what you mean –if you were going to study selected schools –representative projects

In every research endeavor State the hypotheses and/or research questions delimiting the research defining the terms stating the assumptions

Hypotheses Tentative propositions set forth to assist in guiding the investigation of the problem or to provide possible explanation for the observations made

Find Your Problem By September the 14th, submit a clear, precise statement of a computer science problem for research. Be sure –problem is stated in a complete, grammatical sentence –is clear how the area of study will be limited or focused –is more than a simple exercise in gathering information, answering a yes/no question or making a simple comparison