Theoretical Framework
Need a 1+ page answer for the attached 2 questions. All the details needed are in the document.
APA format, intext citations and references are must.
Theoretical Framework – 1+ page
Overview: Rather than writing a full-length literature review for your topic, you will practice developing your theoretical framework for your mock dissertation topic in this assignment and then develop your literature review funnel for assignment 7.2.
· The purpose of the theoretical framework is to tie the dissertation together. As the researcher, you should approach the proposed research from a theory or set of theories that provide the backdrop for the work (researchers do not create theory; they use established theory in which to embed their work).
· This section should describe how this study will relate to existing theories and discuss how the methodology being used in the study links to those theories
· The theoretical framework justifies the methods you plan to use for conducting the study and presents how this research will contribute to the body of knowledge and/or practice. Further, it describes the context within which to locate the intended project and suggests why doing such a study is worthwhile.
Directions:
1. Review the rubric to make sure you understand the expectations of this assignment.
a. DSRT 837 Rubric Adapted from Doctoral Research Handbook.docx
2. Develop a 1 page (more is fine) theoretical framework for your mock dissertation topic. Consider (but do NOT directly answer) the following questions when you write your theoretical framework:
a. Is the theoretical foundation strong?
b. Are the theoretical sources apparent?
c. Are they appropriate for the topic?
d. Do they need further explanation?
3. Submit your theoretical framework to the submission box.
Week1 Research Question:
Using Data Science Techniques To Enhance Data Security in SMBs
Data science is being embedded into cyber security and data security. It is being used to identify the patterns of past attacks and predict the potential risks within the framework of the system. Machine learning is highly used in analyzing large data sets to find the patterns that spot an attack.
Due to the high licensing cost and contracts, many small and medium-scale businesses use open-source tools and applications. This tends to put these organizations in harm’s way. Due to the low volume of data or fewer users in the organization, the management will choose open-source software tools, which sometimes have fewer security protocols and high exposure to data breaches and security threats.
Research Questions:
· What drives SMBs to choose open-source technologies?
· How safe are these open-source data science technologies?
· What measures can be taken to aid SMBs in using open-source data science tools to protect their data better?
I work with a small insurance firm where various open-source applications are used daily. I want to leverage my experience and access to this situation and try finding answers to the above along with my research. I plan to find the reasons behind the management’s decisions and what factors drive technical teams to choose particular open-source technologies. I will research more on their pitfalls and successful implementations.
DSRT 837 Rubric (Adapted from Doctoral Research Handbook)
Criterion |
4 (Expert) |
3 (Proficient) |
2 (Fair) |
1 (Poor) |
I. Critical and reflective thinking capable of facilitating institutional, informational technology, or business related problem-solving or school/ college improvement |
Critically analyzed the topic. Discussion of the topic was extensive and anchored in fact and reason. Information about significant aspects of the topic were analyzed from the perspective of key related concepts. Meaning of the analysis was summarized. |
Critically analyzed the topic. Discussion of the topic was anchored in fact and reason. Information about significant aspects of the topic were analyzed from the perspective of key related concepts. Either the analysis or summary lacked some level of detail. |
Somewhat critically analyzed the topic. Discussion of the topic was minimally anchored in fact and reason. Information about significant aspects of the topic were somewhat analyzed from the perspective of key related concepts. Analysis and summary included but lacks a significant level of analysis and discussion. |
Minimally discussed the topic without supporting facts and reasons. Poor organization of the information and limited level of detail. |
II. Consideration for the impact of leadership, information technology, or business on institutional constituents. |
Demonstrates an extensive understanding of the topic’s relationship to leadership, information technology, or business. |
Demonstrates a good understanding of the topic’s relationship to leadership, information technology, or business. |
Demonstrates a fair understanding of the topic’s relationship to leadership, information technology, or business. |
Demonstrates a minimal understanding of the topic’s relationship to leadership, information technology, or business. |
III. Effective analytical and communication skills |
Demonstrates a professional level of skills associated with formatting, grammar, spelling, syntax, and use of numbers. |
Demonstrates acceptable skills associated with formatting, grammar, spelling, syntax, and use of numbers. |
Needs minor improvement in skills associated with formatting, grammar, spelling, syntax, and use of numbers. |
Needs significant improvement in skills associated formatting, grammar, spelling, syntax, and use of numbers. |
IV. Knowledge of genres, paradigms, theories, literature or trends in business, criminal justice, education, English, health sciences, history, information technology, math, nursing, psychology, religion, or student personnel services. |
Subject is identified, realistic, and grounded in a recognized genre, paradigm, theory, literature, or trend. |
Subject is identified and is realistic, but it lacks grounding in a recognized genre, paradigm, theory, literature, or trend. |
Subject is identified but is not realistic or grounded in a recognized genre, paradigm, theory, literature, or trend. |
Subject area is not established. |
V. Required Components of the assignment as listed in the assignment directions. |
All required parts of the assignment as listed in the assignment directions are included. |
Minor information is missing from the required components of the assignment as listed in the assignment directions. |
Significant information is missing from the required components of the assignment as listed in the assignment directions. |
The assignment lacks the detail needed to meet the requirements for the components of the assignment as listed in the assignment directions. |
1.
,
Literature Review Funnel/Organizer 1+ page
Overview: While the literature review funnel is not necessarily a part of the actual dissertation, the purpose here is to think about the most logical way to organize your future lengthy chapter 2.
Directions:
1. View the rubric to make sure you understand the expectations of this assignment.
a. DSRT 837 Rubric Adapted from Doctoral Research Handbook.docx
2. View this 3 Ways to Structure Your Literature Video to review organizational methods.
https://www.youtube.com/watch?v=PU2uqFY-l4s
3. Research your topic to find the logical starting point to your topic. Then, write your literature review funnel.
4. Upload your literature review funnel to the submission box.
Week1 Research Question:
Using Data Science Techniques To Enhance Data Security in SMBs
Data science is being embedded into cyber security and data security. It is being used to identify the patterns of past attacks and predict the potential risks within the framework of the system. Machine learning is highly used in analyzing large data sets to find the patterns that spot an attack.
Due to the high licensing cost and contracts, many small and medium-scale businesses use open-source tools and applications. This tends to put these organizations in harm’s way. Due to the low volume of data or fewer users in the organization, the management will choose open-source software tools, which sometimes have fewer security protocols and high exposure to data breaches and security threats.
Research Questions:
· What drives SMBs to choose open-source technologies?
· How safe are these open-source data science technologies?
· What measures can be taken to aid SMBs in using open-source data science tools to protect their data better?
I work with a small insurance firm where various open-source applications are used daily. I want to leverage my experience and access to this situation and try finding answers to the above along with my research. I plan to find the reasons behind the management’s decisions and what factors drive technical teams to choose particular open-source technologies. I will research more on their pitfalls and successful implementations.
DSRT 837 Rubric (Adapted from Doctoral Research Handbook)
Criterion |
4 (Expert) |
3 (Proficient) |
2 (Fair) |
1 (Poor) |
I. Critical and reflective thinking capable of facilitating institutional, informational technology, or business related problem-solving or school/ college improvement |
Critically analyzed the topic. Discussion of the topic was extensive and anchored in fact and reason. Information about significant aspects of the topic were analyzed from the perspective of key related concepts. Meaning of the analysis was summarized. |
Critically analyzed the topic. Discussion of the topic was anchored in fact and reason. Information about significant aspects of the topic were analyzed from the perspective of key related concepts. Either the analysis or summary lacked some level of detail. |
Somewhat critically analyzed the topic. Discussion of the topic was minimally anchored in fact and reason. Information about significant aspects of the topic were somewhat analyzed from the perspective of key related concepts. Analysis and summary included but lacks a significant level of analysis and discussion. |
Minimally discussed the topic without supporting facts and reasons. Poor organization of the information and limited level of detail. |
II. Consideration for the impact of leadership, information technology, or business on institutional constituents. |
Demonstrates an extensive understanding of the topic’s relationship to leadership, information technology, or business. |
Demonstrates a good understanding of the topic’s relationship to leadership, information technology, or business. |
Demonstrates a fair understanding of the topic’s relationship to leadership, information technology, or business. |
Demonstrates a minimal understanding of the topic’s relationship to leadership, information technology, or business. |
III. Effective analytical and communication skills |
Demonstrates a professional level of skills associated with formatting, grammar, spelling, syntax, and use of numbers. |
Demonstrates acceptable skills associated with formatting, grammar, spelling, syntax, and use of numbers. |
Needs minor improvement in skills associated with formatting, grammar, spelling, syntax, and use of numbers. |
Needs significant improvement in skills associated formatting, grammar, spelling, syntax, and use of numbers. |
IV. Knowledge of genres, paradigms, theories, literature or trends in business, criminal justice, education, English, health sciences, history, information technology, math, nursing, psychology, religion, or student personnel services. |
Subject is identified, realistic, and grounded in a recognized genre, paradigm, theory, literature, or trend. |
Subject is identified and is realistic, but it lacks grounding in a recognized genre, paradigm, theory, literature, or trend. |
Subject is identified but is not realistic or grounded in a recognized genre, paradigm, theory, literature, or trend. |
Subject area is not established. |
V. Required Components of the assignment as listed in the assignment directions. |
All required parts of the assignment as listed in the assignment directions are included. |
Minor information is missing from the required components of the assignment as listed in the assignment directions. |
Significant information is missing from the required components of the assignment as listed in the assignment directions. |
The assignment lacks the detail needed to meet the requirements for the components of the assignment as listed in the assignment directions. |
1.
,
DSRT 837 Rubric (Adapted from Doctoral Research Handbook)
Criterion |
4 (Expert) |
3 (Proficient) |
2 (Fair) |
1 (Poor) |
I. Critical and reflective thinking capable of facilitating institutional, informational technology, or business related problem-solving or school/ college improvement |
Critically analyzed the topic. Discussion of the topic was extensive and anchored in fact and reason. Information about significant aspects of the topic were analyzed from the perspective of key related concepts. Meaning of the analysis was summarized. |
Critically analyzed the topic. Discussion of the topic was anchored in fact and reason. Information about significant aspects of the topic were analyzed from the perspective of key related concepts. Either the analysis or summary lacked some level of detail. |
Somewhat critically analyzed the topic. Discussion of the topic was minimally anchored in fact and reason. Information about significant aspects of the topic were somewhat analyzed from the perspective of key related concepts. Analysis and summary included but lacks a significant level of analysis and discussion. |
Minimally discussed the topic without supporting facts and reasons. Poor organization of the information and limited level of detail. |
II. Consideration for the impact of leadership, information technology, or business on institutional constituents. |
Demonstrates an extensive understanding of the topic’s relationship to leadership, information technology, or business. |
Demonstrates a good understanding of the topic’s relationship to leadership, information technology, or business. |
Demonstrates a fair understanding of the topic’s relationship to leadership, information technology, or business. |
Demonstrates a minimal understanding of the topic’s relationship to leadership, information technology, or business. |
III. Effective analytical and communication skills |
Demonstrates a professional level of skills associated with formatting, grammar, spelling, syntax, and use of numbers. |
Demonstrates acceptable skills associated with formatting, grammar, spelling, syntax, and use of numbers. |
Needs minor improvement in skills associated with formatting, grammar, spelling, syntax, and use of numbers. |
Needs significant improvement in skills associated formatting, grammar, spelling, syntax, and use of numbers. |
IV. Knowledge of genres, paradigms, theories, literature or trends in business, criminal justice, education, English, health sciences, history, information technology, math, nursing, psychology, religion, or student personnel services. |
Subject is identified, realistic, and grounded in a recognized genre, paradigm, theory, literature, or trend. |
Subject is identified and is realistic, but it lacks grounding in a recognized genre, paradigm, theory, literature, or trend. |
Subject is identified but is not realistic or grounded in a recognized genre, paradigm, theory, literature, or trend. |
Subject area is not established. |
V. Required Components of the assignment as listed in the assignment directions. |
All required parts of the assignment as listed in the assignment directions are included. |
Minor information is missing from the required components of the assignment as listed in the assignment directions. |
Significant information is missing from the required components of the assignment as listed in the assignment directions. |
The assignment lacks the detail needed to meet the requirements for the components of the assignment as listed in the assignment directions. |
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.