Assignment Paper - Week 2-1B

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Research Future 1B

INTRODUCTION

According to studies undertaken by leading experts, the internet is rapidly developing with new

advanced technologies appearing all the time. When a new product or anything that works with

the internet is put into the market, online security has always been the most crucial consideration.

Cyber Criminals attempts every method to gain access to personal data for harmful purposes as

more individuals gain access to the internet. To safeguard users and their data, internet safety

protocols has been established. Since cyber security is continuously evolving, it is a more

engaging topic to the world.

Dissertation 1

The research was conducted by Alberto Cotton from Colorado Technical University in

December 2020. The title of the research is “Identification of Manual Cybersecurity Tasks for

Artificial Intelligence Automation Conversion: A Qualitative Study” (Cotton, 2020).

After collecting and analyzing data, the researcher made recommendation for future

research to be conducted. The first recommendation is that the future researcher should use the

quantitative study to identify the impacts of the AI automations on cybersecurity professionals.

The second recommendation is the study on how the organizations can create a plan to facilitate

the new professions by identifying new cybersecurity tasks requiring creative thinking. The last

recommendation is the study of how the use of AI automation decisions can among the

algorithms, data sets and hardware (Cotton, 2020).

The future recommended studies by Dr. Cotton are relevant to my study.

Dissertation 2
2

The researcher, Theodore Robert Hoffman III, conducted this study for his thesis at Utica

College. The title of the thesis is “5g and the Major Cybersecurity Concerns Regarding the

Implementation of the Technology” (Hoffman, 2019). The researcher suggested the future

research that should focus on the best practice for developing 5G cybersecurity strategy,

development of secure and low-cost IoT devices. The other area to be explored is the use of AI

into the development and security of 5G enabled IoT devices technologies.

Dissertation 3

Dr. Mitchell is from the Syracuse University and conducted a study called “CYBER

SECURITY @ HOME: The Effect of Home User Perceptions of Personal Security Performance

on Household IoT Security Intentions” (Mitchell, 2020). In this study, the researcher, Dr.

Mitchell recommended a future experimental study to test the user interfaces to improve security

feasibility. Dr. Mitchell recommended a pre-survey to measure human factor variables and a

post-test survey to determine whether the user was more confident in their ability to secure their

IoT devices. In addition, Dr. Mitchell suggested a further study can be conducted that could

assess the relationship between security intensions and security behaviors (Mitchell, 2020).

My proposed research will benefit from those future studies because medical devices are

considered as personally owned devices.

Dissertation 4

The title of the study is “Exploring the Security Control Techniques Cybersecurity

Specialists Need to Protect Medical Wearable Devices” (Deal, 2021). According to the

researcher, there is a need to study on how data generated by medical wearables can be used by

insurance companies in real-time since they can help identify the best practice for supporting

medical devices privacy concerns. The future study can investigate the correlation between the
3

healthcare and the insurance providers. The other area of future research is the best approach by

comparing both passive and active Medical Internet of Things (MIoT) devices (Deal, 2021).

As I continue to think about my research problem, I believe this is an excellent area to

investigate.

Dissertation 5

The research of the study is “Security Improvements for Implementing the Internet of

Things into Medium and Large-Sized” (Hines-Cross, 2020). The researcher recommends a future

study to be conducted to determine the successes and shortfalls of this study. Dr. Hines-Cross

recommend the future research to be quantitative instead of qualitative. The researcher

recommended a future research on executive awareness of IoT to understand the executive point

of view. The researcher in this case recommended a survey to be used to find out how many

executives are aware and are willing to adopt IoT technology in their businesses (Hines-Cross,

2020).

I think the future recommendation in this study would serve as my second alternative if I

do not carry out my topic of research.

Dissertation 6

The title of the research is the “Factors That Impact Information Technology Security

Professionals’ Intent to Use Intrusion Detection Systems: A Correlational Study” (Paiola, 2021).

Dr. Paiola recommend a future study to be conducted to explore the variables of IDS acceptance

evaluation usage among other variables.

Dissertation 7

The title of this dissertation is “Defending Infrastructure against Cyber Attacks through

Qualified Cybersecurity Professionals in the Federal Government: A Case Study” (Huhn, 2020).
4

The researcher Dr. Huhn suggested that a future study focusing the critical infrastructure sectors

such as healthcare, finance and others can be done. Another area of study is to compare and

contrast different critical infrastructure sectors inters on the cost, budget implications and

effective technical solutions.

It is relevant because my study will solve the problem of limited cybersecurity

professionals.

Dissertation 8

The title of the research is “Human-Intelligence and Machine-Intelligence Decision

Governance Formal Ontology”, (Mahmud, 2018). The research pointed that more research as

related to HI-MI decision governance require to be conducted to create a knowledge base for

other relevant studies.

Insufficient knowledge base in any profession or field can create a knowledge gap which

can result to negative implications.

Dissertation 9

Dr. Winters conducted a quantitative research to recommend the future studies to be

conducted. The title of the research is “Smartphone Security: A Quantitative Analysis of Security

Usage and Outcomes” (Winters, 2019). The researcher recommended several future researches

but I will discuss only two. The first one is a study to be conducted based on the outcome of this

study that would measure the effectiveness of the mobile device security. The second one is a

study that would gather amount of data loss and compare different security measures used

(Winters, 2019).

It is relevant because after completing my study, I would recommend a extensive

research to be conducted to measure the effectiveness.


5

Dissertation 10

The title of the research is “Machine Learning Approaches to Improve Security and

Performance Monitoring of IoT Devices” (Kayode, 2020). In this study, the research

recommended a future study to be conducted in monitoring of digital twins and determine the

best way to easily upgrade connected devices or remotely deploy and monitor the updates

(Kayode, 2020).

SUMMARY

Organizations, individuals, and governments have recently adopted a reactive, "point product"

strategy to countering cyber threats, combining various security systems – one on top of the other

– to protect their networks and the precious data contained inside them. This technique is not

only costly and complicated, but news of devastating cyber breaches continues to dominate

headlines, rendering it useless. Given the growing number of data breaches, the subject of cyber

security has risen to the top of the priority list for boards of directors, who are looking for a less

hazardous route forward. Instead, choose a natively integrated, automated Next-Generation

Security Platform that is especially intended to deliver consistent, prevention-based security —

on endpoints, in data centers, on networks, in public and private clouds, and across Saabs

environments. Organizations can prevent cyber-attacks from affecting their networks in the first

place and reduce overall cyber security risk to a tolerable level by concentrating on prevention.
6

REFFERENCE

Cotton, A. (2021). Identification of Manual Cybersecurity Tasks for Artificial Intelligence

Automation Conversion: A Qualitative Study (Doctoral dissertation, Colorado Technical

University).

Deal, J. M. (2021). Exploring the Security Control Techniques Cybersecurity Specialists Need to

Protect Medical Wearable Devices (Doctoral dissertation, Colorado Technical University).

Hines-Cross, D. (2020). Security Improvements for Implementing the Internet of Things into

Medium and Large-Sized Businesses (Doctoral dissertation, Colorado Technical University).

Hoffman III, T. R. (2019). 5G and the Major Cybersecurity Concerns Regarding the

Implementation of the Technology (Doctoral dissertation, Utica College).

Huhn, H. L. (2020). Defending Infrastructure against Cyber Attacks through Qualified

Cybersecurity Professionals in the Federal Government: A Case Study (Doctoral dissertation,

Capella University).

Kayode, O. (2020). Machine Learning Approaches to Improve Security and Performance

Monitoring of IoT Devices (Doctoral dissertation, The University of Texas at San Antonio).

Mahmud, F. (2018). Human-Intelligence and Machine-Intelligence Decision Governance Formal

Ontology. Old Dominion University.

Mitchell, E. M. (2020). Cyber Security@ Home: The Effect of Home User Perceptions of

Personal Security Performance on Household IoT Security Intentions (Doctoral dissertation,

Syracuse University).

Paiola, M. (2021). Factors that Impact Information Technology Security Professionals’ Intent to

Use Intrusion Detection Systems: A Correlational Study (Doctoral dissertation, Capella

University).
7

Winters, B. (2019). Smartphone security: A quantitative analysis of security usage and

outcomes (Doctoral dissertation, Colorado Technical University).

You might also like