What is an Information Technology Project?
1. What is an Information Technology Project? (Max 50 words) ”Cite the source - Use APA."
2. What is research? (Max 50 words) “Cite the source - Use APA."
3. Why do we need to do research? (Max 50 Words) “Cite the source - Use APA."
3.1. – Explain what we mean by Qualitative research
3.2. – Explain what we mean by Quantitative Research
3.3. – What is a survey?
3.4. – List the major parts of a research paper
3.5. – What is a Peer Review-Journal?
4. As students / Scientists, what topic/s do we need to research? (Max 50 Words) “Cite the source - Use APA."
4.1. – Why do we need to use keywords during our Lit Review?
5. What is a research methodology? (Max 100 Words) “Cite the source - Use APA."
6. What is a research design? (Max 100 Words) "Cite the source – Use APA."
7. What do we mean by project deliverable? (Max 50 Words) “Cite the source - Use APA."
8. Is deadline an important aspect of a project? (Max 50 Words) “Cite the source - Use APA."
9. What are project limitations? (Max 50 Words) “Cite the source - Use APA."
10. What do we mean when we say resources? (Max 100 Words) “Cite the source - Use APA."
11. Why do we need to apply APA Basic Citation Stiles in a research proposal? (Max 100 Words). “Cite the source - Use APA."
12. From our Syllabus, please explain what we mean by Academics Integrity. (Max 250 Words) “Cite the source - Use APA."
13. What is Plagiarism? (Max 100 Words) ”Reference the Academic Integrity from the Syllabus"
14. What is Self-Plagiarism? (Max 50 Words) ”Reference the Academic Integrity from the Syllabus"
15. What are bar charts? (Max 15 words)
16. What is a central question? (Max 15 words)
17. What do we mean when we say: Cleaning the Data? (Max 25 words)
18. What is a sample size formula? (Max 25 words)
19. Define the term "Statistics" (Max 20 words)
To complete this assignment, the following must be observed.
1. - Use only Peer-reviewed journals to research the above questions. (When Applicable)
2. - Adhere and apply properly the Basic Citation Styles of the APA (Use as a reference the APA Manual.).
3. – If you use another author's ideas, concepts, and words, you must cite the source and credit the author. Not citing in-text the source will be considered Plagiarism, and you will receive zero (0) for your assignment.
4. - Do not copy and paste information. (You will receive zero (0) for your Assignment).
5. - No late submission is accepted.
6. – This is an individual assignment, not a group assignment.
7. - You must use the Sample-APA-Paper provided to submit your assignment.
8. – Use the Sample – APA – Paper provided as a guide to submit your assignment.
8.1. Observe the Paper Structure and Formatting.
8.2. Make sure you observe The Title Page and Structure.
8.3. Your list of references must be per APA.
8.4. Fill in the Certificate of Authorship located at the end of the paper.
Title (Font 14)
by
Students’ Name
An assignment submitted in partial fulfillment of the requirements
for ISOL 633 course as part of the degree of ___________
In
______________________
School of Computing and Information Sciences
University of the Cumberlands
ISOL 633 – Legal, Regulations, Investigations, and Compliance
Professor: Dr. Zadok Hakim
Due: December 2, 2018
Fall 2018
ii
Table of Content
Theory summary …………………………………………………………………………………………………………….. 1
References ……………………………………………………………………………………………………………………… 3
1
Theory Summary
Deterrence theory
Deterrence theory (DT) is originally a term used in psychology and criminology, and it is
used to provide a model for understanding human thoughts, emotions, and behaviors. Erickson,
Gibbs, and Jensen (1977, p. 305) stated that, XXXXXXXXXXXXXXXXXXXXXXXXXXX.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX. Additionally, the literature reveals that,
the more severe a punishment, it is thought, the more likely that a rationally calculating human
being will desist from criminal acts. In criminology, “the concept of deterrence is used to
describe the prevention of criminal behavior through the use of, or by the threat of, legal
sanctions” (Meier & Johnson, 1977, p. 293)
According to D'arcy and Herath (2011, p. 488), deterrence theory is “one of the most
widely applied theories in information systems (IS) security research, particularly within
behavioral IS security studies”.
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
2
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Conclusion
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
X.
3
References
D'arcy, J., & Herath, T. (2011). A review and analysis of deterrence theory in the IS security
literature: Making sense of the disparate findings. European Journal of Information
Systems, 20(6), 643-658.
Erickson, M. L., Gibbs, J. P., & Jensen, G. F. (1977). The deterrence doctrine and the perceived
certainty of legal punishments. American Sociological Review, 305-317.
Meier, R. F., & Johnson, W. T. (1977). Deterrence as social control: The legal and extralegal
production of conformity. American Sociological Review, 292-304.
4
University of the Cumberlands
School of Computing and Information Sciences
Certification of Authorship
Submitted to (Professor’s Name): Dr. Zadok Hakim
Course: ________________________
Student’s Name: ________________
Date of Submission: December 2, 2018
Purpose and Title of Submission: ____________________________________________
Certification of Authorship: I hereby certify that I am the author of this document and that any
assistance I received in its preparation is fully acknowledged and disclosed in the document. I
have also cited all sources from which I obtained data, ideas, or words that are copied directly or
paraphrased in the document. Sources are properly credited according to accepted standards for
professional publications. I also certify that this paper was prepared by (me or by my group #)
for this purpose.
Students’ Signature: ____________________________
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.