Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Technology Evaluation Study Plan - Detailed Assignment Description

This assignment is the third and final part Analysis of Alternatives exercise.

Choose one of the student-written Technology Selection papers from the list posted.

Read your chosen Technology Selection paper to learn more about the selected technology. Next, consider what type of formal evaluation study could be used to learn more about this technology and how it is likely to interact with people, processes, and technologies. Then, design a formal evaluation study which could be used to obtain more information about one or more of the following:

o characteristics (features and capabilities) of the technology
o interactions among technologies, people, environments, and processes (use cases or scenarios)
o risks or vulnerabilities associated with adoption of this technology
o costs and benefits associated with adoption of this technology

CHOOSE YOUR EVALUATION METHOD

Your evaluation study design must use one of the following:

o Case Study
o Delphi Study (panel of subject matter experts)
o Quasi-Experiment (e.g. penetration testing or pilot testing in a controlled environment)
o Pilot Implementation (in a demonstration environment)

See theTechnology Evaluation Methods module in the Week 2 conference for detailed descriptions of each of these types of evaluation methods.

DESIGN YOUR STUDY

Identify the specific questions that your formal evaluation study will address. These questions must be security-focused (review the Pillars of Information Security and Pillars of Information Assurance for ideas). Your design should include a description of the specific security issues which will be tested or security capabilities which will be evaluated. Use standard terminology when writing about security issues (see the rubric).

DEVELOP YOUR EVALUATION STUDY PLAN

Use your study design to prepare a high-level plan for your evaluation study. Your plan must include the following:

o Introduction

- description of the emerging technology and justification for including it in an evaluation study

o Research Question(s)

- These must be security focused. Use the Five Pillars of Information Assurance and / or the Five Pillars of Information Security.
- Use "how" or "what" questions (writing good "why" questions is beyond the scope of this course).
- Examples
- What vulnerabilities exist that could be attacked to compromise confidentiality?
- How could an attacker compromise availability?
- For each research question, provide a brief description of a scenario or use case which could be used to answer the question. Your description should be one paragraph (no longer).

o Methods

- high level design of the study (focus upon the evaluation model and your research questions)

- description of how the technology will be incorporated or used in the study (including specific security issues which will be tested or security capabilities which will be evaluated)

- notional system or network architecture diagram showing the pilot test environment (only if you are doing a pilot study)

o Limitations or Special Considerations

- any special considerations or security concerns which must be addressed (e.g. "clean room," test data sanitization, or isolation environment to prevent the pilot study from causing harm to operational systems)

o Timeline of Events (Notional)

- A notional timeline (expressed in days or months after start date) for your study

NOTIONAL TIMELINE OF EVENTS

The notional timeline of events (stated in days or months after start) that provides an estimate of how long you expect your evaluation study to take. For a Delphi Method study, your study could take as little as a day or two. For a Delphi Method Study, include the number of "rounds" and how long each round will be (the time allotted for experts to consider information and reply back with their opinion on the questions or issues).For a case study, quasi-experimental, or pilot implementation design, your study may span several months; in this case, divide your timeline into phases (setup, testing, reporting).

COST ESTIMATE IS NOT REQUIRED

Normally, an evaluation study plan will include a cost estimate. For this course, we will NOT be including cost elements in our evaluation study plans as the information required to developthese items is not readily available to students. If you wish to address this area of a study plan, limit your discussion to a brief listing of the cost elements (people, technologies, facilities) and state that a cost estimate will be provided separately.

DOCUMENT YOUR PLAN

Your Technology Evaluation Study Plan should be at least three pages in length but no more than ten pages (excluding the title page and references page). This should be a high level design that can be read quickly. Your study plan must contain the five major sections defined above and comply with the formatting guidance provided by your instructor.

Attachment:- Technology_Selection_Paper.rar

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92295162
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Do you need computers or information and communication

Do you need computers or information and communication technologies to store, organize, and manage data in organizations? Explain how the present day organizations in a developed country like the USA store and manage the ...

Question 1 should on four different conflicts you have

Question: 1. Should on four different conflicts you have encountered. These conflicts can be work related or personal conflicts. The presentation will consist of 5 slides from each group member and must have at least 1 a ...

Assignment -question 1 - go-back-n in the following network

Assignment - Question 1 - (Go-Back-N) In the following network, node A transmits packets that pass through B and C, and arrive at the destination D. The bit rate of all links is R = 1 Mbit/sec. The maximum packet size in ...

A study investigated whether time perception an indication

A study investigated whether time perception, an indication of a person's ability to concentrate, is impaired during nicotine withdrawal. Smokers were randomly selected and asked to estimate how much time has passed duri ...

What is the broadcast domain and ports for hubs and

What is the Broadcast Domain and Ports for hubs and bridges?

Question when you supervisor arrives she has a document

Question : When you supervisor arrives, she has a document with her for you to sign, indicating the condition of the computer, how you kept it secure while you waited for her, and the transfer of responsibility for the c ...

How do you calculate the annual interest rate of 12

How do you calculate the annual interest rate of 12% compounded monthly. I know how to do for annually but not monthly. You are offered the opportunity to put some money away for retirement. You will receive 10 annual pa ...

Scenarioyour friend tim hall is an expert in creating

Scenario Your friend, Tim Hall, is an expert in creating websites. In Hall's opinion, creation of websites is now a simple task using tools such as Adobe Dreamweaver, and therefore, he does not feel the need to learn HTM ...

I suppose alice wants to send a long message m to bob if

(i) Suppose Alice wants to send a long message m to Bob. If Alice and Bob already share a secret key k, and they use HMAC to protect the integrity of the message m, what should the message format be (or what components s ...

Analyze the time complexity of the following ternary search

Analyze the time complexity of the following ternary search algorithm: identify two points that subdivide a sorted array into three parts. If the given number is equal to one of these two points, we are done. Otherwise, ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As