At this point, you have found 4 research articles exploring your approved research question and you have learned how to find your 6 ‘ingredients’ during class (contact the
Assignment Content
- At this point, you have found 4 research articles exploring your approved research question and you have learned how to find your 6 'ingredients' during class (contact the Graduate Research Center for help if you need it: [email protected]).
For this assignment: You will use ONE of you research articles from p. 13a to write your first objective summary.
Requirements:- 15 pts, Cover/Title Page
- 70 pts, Objective Summary: W(5) H(1) — YOU MUST PUT THIS IN YOUR OWN WORDS
- 15 pts, References Page (you will only have one reference listed — the research article you are using.)
- Resources to help you:
- Re-watch the class recording
- See pp. 17-22 to read about objective summaries
- See pp. 23-28 to read more about avoiding plagiarism
image1.png
image2.png
image3.png
image4.png
image5.png
,
Assignment # Graduate Research 2
Research and Critical Analysis
Your Name
Department ???,
KG604: Graduate Research & Critical Analysis
Dr. Tennyson
January 22, 2023
Issue/Problem 1: 5G Applications
1) People Involved: Individuals, organizations
The US was involved in the 5G race. President Trump explained that America had to win the 5G race by quickly launching the network. However, it was noted that 5G networks were more vulnerable to cyberattacks than other networks.
2) Link to Article: https://www.brookings.edu/research/why-5g-requires-new-approaches-to-cybersecurity/
3) My Research Question: What have researchers learned about impacts of 5G networks on cybersecurity of individuals and organizations?
5G complicates cyber vulnerability because it virtualizes in software high-level network functions. There is vulnerability caused by attaching many hackable smart devices to the network.
Issue/Problem 2: Internet of Things and data privacy
The rise of Internet of Things raised privacy concerns. IoT devices collected data about the daily activities and habits of individuals. These data included location data, health data, and consumption-rate data.
1) People Involved: Internet users
2) Link to Article: https://en.unesco.org/inclusivepolicylab/analytics/data-privacy-and-internet-things 3) My Research Question: What have researchers learned about the impact of Internet of Things on data privacy of internet users?
IoT devices can be used by entities to obtain access to people’s homes. Individuals might not be able to determine what will happen to their information.
,
RESEARCH PROBLEM PROPOSALS 1
HW: Research Problem Proposals with Research Questions
Nikunj Dasharathbhai Patel
Department of Computer Science, Monroe College, King Graduate School
KG604: Graduate Research & Critical Analysis
Professor Jonathan Kyei
1/24/2023
RESEARCH PROBLEM PROPOSALS 2
HW: Research Problem Proposals with Research Questions
Issue/Problem 1: Cybersecurity and privacy
1) People Involved: Internet users, members of the public
The Red Cross Data Breach happened in January 2022. The hackers attacked servers with
personal information of 500,000 people.
2) Link to Article: https://www.theguardian.com/world/2022/jan/20/hacking-attack-on-red-
cross-exposes-data-of-515000-vulnerable-people
3) My Research Question: What have researchers learned about impacts of cybersecurity
breaches on individuals?
Cybersecurity issues have led to loss of privacy among individuals. Personal information
has been used to blackmail individuals and steal from them.
Issue/Problem 2: Artificial intelligence
1) People Involved: Society, members of the public
2) Link to Article: https://www.washingtonpost.com/opinions/2022/06/26/problem-with-self-
driving-cars-many-dont-drive-themselves
3) My Research Question: What have researchers learned about self-driving cars on the society
and individuals?
RESEARCH PROBLEM PROPOSALS 3
Self-driving cars use the concept of artificial intelligence. These cars have helped
members of the public, but they have also caused accidents.
,
1
Research Article
Student Name
Institutional Affiliation
Course Number and Name
Instructor Name
Due Date
Research Article
What is your approved research question from the Brainstorming Research Question HW assignment? (5 pts)
My Research Question: What have researchers learned about self-driving cars on the society and individuals
What is the title of the research article you found? (5 pts)
Safety of the Introduction of Self-driving Vehicles in a Logistics Environment
Does the article contain the methodology the researchers used to conduct the study/research?
Methodology
Through an extensive literature review, we explore the development and current state of self-driving vehicles, afterward, we raise the most significant ethical issues, decisions, and trust factors reflected by society's attitude towards the spread of self-driving vehicles on public roads. Based on the answers received in an in-depth interview with the head of a logistics company with decades of experience, the main advantages and possibilities of automated vehicles used in logistics and the current weaknesses of the technology are presented.
Does the article contain findings or results of the research?
In the literature review, we analyzed the self-driving systems and, in addition, narrowed them down to the introduction of self-driving systems for logistics vehicles. We then based the primary research on secondary research, as the decision criteria were summarized based on the existing literature. In the course of our research, we determined the most important properties of the introduction of logistics and vehicle self-driving systems and their relationship system using an inductive inference method (Model graph). In addition, we have introduced several important parameters for the intention to introduce, which describe the current market trends and may help the manufacturers to operate with a greater understanding of the expert/consumer side. With the familiar parameters, the model can be used and utilized at any time by professionals familiar with the self-driving system, as this was a narrowed area using the 22 most important parameters considered by the experts. In the model, the outputs can be modified by adding new decision criteria and by adding supplementary decision criteria.
References.
Viktor, P., & Szeghegyi, Á. (2022). Safety of the introduction of self-driving vehicles in a logistics environment. Periodica Polytechnica.Transportation Engineering, 50(4), 387-399. doi: https://doi.org/10.3311/PPtr.20006
,
1
Research Article
Student Name
Institutional Affiliation
Course Number and Name
Instructor Name
Due Date
Research Article
What is your approved research question from the Brainstorming Research Question HW assignment? (5 pts)
My Research Question: What have researchers learned about the impact of Internet of Things on data privacy of internet users?
What is the title of the research article you found? (5 pts)
The Internet of Things and Its Impact On Individual Privacy
Does the article contain the methodology the researchers used to conduct the study/research?
This research followed two phases. In Phase 1 a systematic literature review was conducted following two activities: 1) a literature search process to identify and select relevant articles, and 2) a content analysis of the literature to identify themes that represent key concerns related to individual privacy from the perspective of the IoT. In Phase 2, a critical analysis followed that compared themes that emerged from Phase 1 with the APPs. The two phases are outlined below
Phase 1: Systematic literature review
Literature search activity
The literature search process involved a manual search of relevant articles using three search engines: Google Scholar, ‘Discovery’ (a proprietary university search-engine) and Springer’s Science & Business Media. The search was restricted to English, peer-reviewed journal papers and conference proceedings and used keywords related to the main topic of the study: ubiquitous computing, pervasive computing, Internet of Things, privacy, and individual privacy. Based on journal and conference paper abstracts and keywords, backward and forward chaining techniques and working through paper’s references to find papers that fit the search criteria, a collection of 52 key papers dated between 1993 and 2015 from 22 different journal outlets and conference proceedings were identified for the content analysis activity.
Literature content analysis activity
The content of each selected article was analyzed in more depth with a focus on the theme of the study. This closer inspection of each paper’s content reduced the eligible papers that fully covered the study’s key theme, to a total of 28 papers (see literature references in Table 3), which formed the basis for the in-depth content analysis activity. In the course of conducting the content analysis, a need for defining and gaining deeper knowledge about the information privacy topic emerged. This led to the identification of, and addition of a further nine journal papers that dealt specifically with this topic. The final set of 37 papers were analyzed using content analysis techniques that involve a concept mapping activity whereby key themes emerging from the literature are represented in a concept map (Novak, 2003). A concept map is a diagrammatic representation that organizes and represents key themes through a series of relationships between these themes. Four key themes regarding the impact of IoT technologies on an individual’s privacy emerged: unauthorized surveillance, uncontrolled data generation and use, inadequate authentication and information security risks. The second phase critically compared these four IoT privacy issues with the 13 APPs as described in the next section.
Phase 2: Critical comparison of IoT privacy concerns with the APPs
Following the in-depth context analysis and accompanying concept-mapping activity, the final four themes that emerged from the first phase, were critically juxtaposed with the 13 APPs. The major aim was to conduct an in-depth gap analysis to find possible weaknesses of the APPs with regards to the new disruptive IoT technology and individual privacy. Themes identified from the content analysis, were used to classify the IoT privacy issues referenced by the literature and map them with current APPs.
Does the article contain findings or results of the research?
In reflection of the research question: To what extent does the Australian Privacy Principles protect an Australian individual’s privacy in relation to data collected via the Internet of Things? findings of this study found that the current APP has limitations in terms of individual privacy and data collection through the IoT. These limitations impact on the ways in which individual data is collected, used and handled. In the sections that follow, APP limitations are first outlined, followed by key ethical considerations that need to be taken into account, and suggestions of legal reform to focus on individual privacy in a new era of the IoT.
References.
Caron, X., Bosua, R., Maynard, S. B., & Ahmad, A. (2016). The Internet of things (IoT) and its impact on individual privacy: An Australian perspective. Computer Law & Security Review, 32(1), 4-15. https://doi.org/10.1016/j.clsr.2015.12.001
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.