This book introduces impact-driven research paths in computer science, information systems and cybersecurity with practical insights, effective instructions, and examples. The book takes the students through the full cycle of research until the point of submission and evaluation. The book begins by
Research Techniques for Computer Science, Information Systems and Cybersecurity
â Scribed by Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor
- Publisher
- Springer
- Year
- 2023
- Tongue
- English
- Leaves
- 187
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book introduces impact-driven research paths in computer science, information systems and cybersecurity with practical insights, effective instructions, and examples. The book takes the students through the full cycle of research until the point of submission and evaluation. The book begins by providing postgraduate research students with the foundational concepts and techniques to simplify the complexities associated with choosing topics in the computer science (CS), information systems (IS) and cybersecurity (CY) research domains. The authors furnish readers with fundamentals that facilitate active quantitative, qualitative, and mixed methods research enquiries. The content offers important perspectives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.ctives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.ctives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.ctives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.ctives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.ctives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.
⌠Table of Contents
Foreword
Foreword
Comments from Reviewers
Preface
Chapters at a Glance
Chapter 1: Twenty-First Century Postgraduate Research
Chapter 2: Computer Science (CS), Information Systems (IS) and Cybersecurity(CY) Research
Chapter 3: Designing the Research Proposal or Interim Report
Chapter 4: Adopting a Funnel Strategy and Using Mind Mapping to Visualize the Research Design
Chapter 5: Foundational Research Writing, Background Discussion and Literature Review
Chapter 6: Research Philosophy, Design and Methodology
Chapter 7: Data Collection, Presentation and Analysis
Chapter 8: Research Management: Starting, Completing and Submitting the Final Research Report, Dissertation or Thesis
Acknowledgements
Contents
List of Figures
List of Tables
Acronyms
About the Authors
Chapter 1: Twenty-First Century Postgraduate Research
1.1 Introduction
1.2 The Concept of Research
1.2.1 Scientific Paradigm
1.2.2 Scientific Philosophy
1.2.3 Ethics and Avoiding Plagiarism
1.3 Research Types
1.3.1 Basic/Fundamental/Theoretical Research
1.3.2 Applied/Practice-Oriented/Trade-Oriented Research
1.4 Research Attributes
1.5 Qualities of Research
1.6 Research Cycle
1.7 What Is Not Academic Research?
1.8 Philosophical Research Design
1.9 Some Types of Research Applicable in Information Systems and Cybersecurity Research
1.9.1 Descriptive Research
1.9.2 Exploratory Research
1.9.3 Applied Research
1.9.4 Experimental Research
1.9.5 Theoretical Research
1.10 Quality in Research Writing
Bibliography
Chapter 2: Computer Science (CS), Information Systems (IS) and Cybersecurity (CY) Research
2.1 Introduction
2.2 CS Research
2.3 IS Research
2.4 Cybersecurity (CY) Research
2.5 The Intersection of CS, IS and CY Research
2.6 Summary
Bibliography
Chapter 3: Designing the Research Proposal or Interim Report
3.1 Introduction
3.2 Visualizing the Research Proposal as Motivation to Conduct Research
3.3 Writing a Convincing Research Proposal
3.3.1 Cover Pages
3.3.2 Research Introduction
3.3.3 Research Problem Statement: Identify a Research Problem That Needs Attention
3.3.4 Research Purpose Statement: Clearly Stating the Purpose of the Study
3.3.5 Research Questions and/or Hypotheses
3.3.6 Brief Statement of Methodology
3.3.7 Statement of Significance
3.3.8 Background to the Research Problem Statement: Including Powerful Supporting Information
3.3.9 Literature Review
3.3.10 Research Methodology and Methods/Procedures
3.3.11 List of References and In-Text Referencing
3.4 Framework for Thinking About Originality in the Research Design
3.5 Research Proposal Presentation
3.5.1 Proposal Timeframes
3.5.2 Research Proposal Presentation and Feedback
3.5.3 Research Proposal Review Panel Composition
3.5.4 Research Proposal Panel Decision
3.6 Closing Thoughts
Bibliography
Chapter 4: Adopting a Funnel Strategy and Using Mind Mapping to Visualize the Research Design
4.1 Introduction
4.2 The Concept of Research Strategy
4.3 The Funnel Strategy Approach
4.3.1 The Subject Area
4.3.2 Preparing and Writing the Background Discussion
4.3.3 Review of Scholarly Literature
4.3.4 Identifying Gaps, Flaws, Defects and Weaknesses
4.3.5 More Thoughts on Scoping the Research
4.3.5.1 The Research Problem Statement
4.3.5.2 Sample of Research Problem Statement
4.4 Design Project Versus Research Project
4.5 Developing the Flow of Ideas
4.6 Mind Mapping Applied to Research Design
4.6.1 The Concept of Mind Mapping
4.6.2 Mind Map Use Cases and Benefits
4.6.3 Application of Mind Mapping to Setting Out the Research Tasks
4.7 Applying the Funnel Strategy and Mind Mapping to the Research Content
4.7.1 Example 4.7.1: Autonomous Agent and Multiagent Systems
4.7.2 Example 4.7.2: Artificial Intelligence (AI) and Robotics
Bibliography
Chapter 5: Foundational Research Writing, Background Discussion and Literature Review for CS, IS and CY
5.1 Introduction
5.2 Foundational Research Tools and Techniques
5.2.1 Writing the Annotated Bibliography
5.2.2 Reading and Writing with Purpose
5.2.3 Critical Thinking and Analysis
5.3 Background Discussion
5.3.1 Practice-Oriented Background and Review of Trends
5.3.2 Theoretical Background
5.3.3 Conceptual Background
5.3.4 Theoretical Background Versus Conceptual Background
5.4 Literature Review and Analytical Framework
5.4.1 Literature Survey
5.4.2 Critical Literature Reviews
5.4.2.1 Theoretical Literature Review
5.4.2.2 Historical Literature Review
5.4.2.3 Argumentative Literature Review
5.4.2.4 Integrative Literature Review
5.4.2.5 Methodological Literature Review
5.4.2.6 Narrative Reviews Versus Systematic Literature Reviews
5.5 Structuring and Organizing the Literature Review
5.5.1 Locating a Focal Point or Central Interest
5.5.2 Logical Coherence
5.5.3 Basic Structural Components
5.6 Analytical Framework Diagram
5.7 Important Hints on Writing Literature Reviews
5.8 Chapter Summary
5.9 Chapter Exercise
Bibliography
Chapter 6: Research Philosophy, Design and Methodology
6.1 Introduction
6.2 Research Philosophy
6.2.1 Ontology
6.2.2 Epistemology
6.2.2.1 Positivism
6.2.2.2 Interpretivism
6.2.2.3 Pragmatism
6.2.2.4 Realism
6.2.3 Axiology
6.2.4 Doxology
6.2.5 Methodology
6.2.6 Why Is Philosophical Reasoning So Important in Research?
6.2.6.1 Perspectives on Epistemology: Positivism
6.2.6.2 Perspectives on Epistemology: Interpretivism
6.2.6.3 Perspectives on Epistemology: Pragmatism
6.2.6.4 Perspectives on Epistemology: Realism
6.2.6.5 Quick Comparative Overview of Epistemology
6.3 Research Design
6.3.1 CS, IS and CY Research Design
6.3.2 Types of Research Design
6.3.2.1 Descriptive Research Design
6.3.2.2 Experimental Design
6.3.2.3 Comparative Study Design
6.3.2.4 Causal-Comparative/Quasi-Experimental Design
6.3.2.5 Correlational Research Design
6.3.3 Requirements Engineering
6.3.3.1 Observational Study
6.3.3.2 Simulation Studies
6.3.3.3 Case Study Design
6.4 Research Methodology
6.4.1 Quantitative Methodology
6.4.1.1 Data Collection
6.4.1.2 Data Analysis
6.4.1.3 Trend Analysis
6.4.1.4 Total Unduplicated Reach and Frequency Analysis (TURF)
6.4.1.5 SWOT Analysis
6.4.1.6 Gap Analysis
6.4.2 Qualitative Approach
6.4.2.1 Data Collection
6.4.2.2 Data Analysis
6.4.2.3 Mixed-Methods Approach
Bibliography
Chapter 7: Data Collection, Presentation and Analysis
7.1 Introduction
7.2 Overview of Data Collection Techniques and Processes
7.2.1 Data Identification
7.2.2 Data Gathering
7.2.3 Data Organization, Selection and Processing
7.2.4 Data Presentation
7.2.5 Data Analysis
7.3 Types of Data Collection
7.3.1 Experiments
7.3.2 Derived Data
7.3.3 Observation
7.3.4 Simulations and Digital Twins
7.3.5 Surveys
7.3.5.1 Cross-Sectional Surveys
7.3.5.2 Longitudinal Surveys
7.3.5.3 Retrospective Survey
7.3.6 Interviews
7.3.7 Focus Group Discussion
7.4 Designing the Data Collection Instrument: General Guidelines
7.4.1 General Objectives
7.4.2 Research Data Requirement Specifications
7.4.3 Preparing the Sample
7.4.4 Creating the Instrument
7.5 Designing Data Collection Instruments: Using Measurement Scales in Quantitative Research
7.5.1 Normal Scale (Categorical Variable Scale)
7.5.2 Ordinal Scale
7.5.3 Interval Scale
7.5.4 Ratio Scale
7.6 Designing Data Collection Instruments: Qualitative Research
7.6.1 Ethics Clearance Requirements
7.6.2 Primary Data
7.6.3 Secondary Data
7.6.4 Interview Guide
7.6.5 Focus Group Guide and Protocol
7.6.6 Observation
7.6.7 Participant Observation
7.6.8 Document Review
7.7 Data Organization, Selection and Processing
7.7.1 Structured Data
7.7.2 Unstructured Data
7.8 Data Presentation and Data Visualization
7.8.1 Textual Form
7.8.2 Tabular Form
7.8.3 Graphical Form
7.8.4 Visual Charts
7.9 Data Analysis
7.9.1 Techniques for Data Analysis
7.9.1.1 Quantitative Data Analysis Techniques
7.9.1.2 Qualitative Data Analysis
7.9.2 Data Analysis Tools
7.9.3 Artificial Intelligence (AI) Data Collection, Presentation and Analysis Platforms
7.10 Chapter Summary
Bibliography
Chapter 8: Research Management: Starting, Completing and Submitting the Final Research Report, Dissertation or Thesis
8.1 Introduction
8.2 Research Planning
8.2.1 Research Problem
8.2.2 Purpose or Goal and Objectives
8.2.3 Situational Analysis
8.2.4 Strategy for Completing the Research
8.2.5 Adaptability to Change in the Research Environment
8.2.6 Continuous Evaluation
8.2.7 Gantt Chart
8.3 Supervisory Relationship
8.3.1 Gather Information and Know the Supervisor Before the Start
8.3.2 Understand the Expectations
8.3.3 Fashion Good Communication Strategy
8.3.4 Consider That the Supervisor Has Other Matters to Attend To
8.3.5 Alternative Supervisor
8.4 Resource Management
8.5 Time Management
8.6 Creating Research, Home Life Balance
8.7 Completing the Research Report, Dissertation or Thesis Ready for Examination
8.8 Defence or Viva
8.8.1 Planning and Preparing for Defence
8.8.2 Checklist for Defence
8.8.3 The Defence Room
8.9 Summary
Bibliography
Index
đ SIMILAR VOLUMES
<span>This book includes extended and revised versions of selected papers from the 11th and 12th editions of the International Conference on Operations Research and Enterprise Systems (ICORES 2022 and ICORES 2023). ICORES 2022 was held as a virtual event in February 2022, and ICORES 2023 was held in
Unlock the world of ethical hacking with "Ethical Hacking: Understanding the basics of Hacking Tools and Techniques for Cybersecurity and Safeguarding Information in computer systems and computer networks." This comprehensive guide takes you on a journey through the fundamentals of ethical hacking,
<span>This book includes extended and revised versions of selected papers from the 7th and 8th edition of the International Conference on Information Systems Security and Privacy (ICISSP 2021 and ICISSP 2022). ICISSP 2021 and 2022 was held as an online event due to the Covid-19 pandemic, from Februa
With everything readers need to know about how to execute their research project, this book is written specifically for information systems (IS) and computing students. It introduces key quantitative and qualitative research methods, makes sense of underlying philosophies, and helps readers navigate
With everything readers need to know about how to execute their research project, this book is written specifically for information systems (IS) and computing students. It introduces key quantitative and qualitative research methods, makes sense of underlying philosophies, and will help readers navi