In this course, students conduct a literature review in Information Security and other relevant bodies of research to identify a proposed solution to the business problem. Using this literature review, they present support for the selection of the proposed solution and identify criteria to be used in assessing its feasibility.
By the end of this course, the student should know or be able to:
- To develop an understanding of the underlying concepts of academic research
- To apply these research concepts to the modifications required for dissertation deliverables
- To work on the Chapter 2 of the dissertation proposal (a.k.a., the Literature Review)