Tag Archives: Flow Chart

Research Outline and Flow Chart

Hypothesis: With the growth of electric vehicles and the growth of artificial intelligence in vehicles (Gas or battery powered), helping people understand how  artificial intelligence works in vehicles will eliminate some from not believing that artificial intelligence is good. Proposal Outline Introduction Lightweight Artificial Intelligence: Gupta et al., 2022; Autonomous Vehicles Cunneen et al., 2019; … Continue reading Research Outline and Flow Chart

proposal outline in networking

Hypothesis: Educating staff to be on the look out for network vulnerabilities. Proposal outline: Introduction: will go over why securing the network is important for personal and corporation use. give a few example to what happens when a network is not properly secured. the many ways a network can be vulnerable and secured.( Literature Review) … Continue reading proposal outline in networking

Cyber-Attacks and Employee Involvement Flow Chart

Hypothesis: Educating employees about cyber-attacks and training employees to help prevent cyber-attacks. Proposal Outline Introduction ALLARD, E. (2016). Cybersecurity forum spells out business risk. New Hampshire Business Review, 38(12), 14. Explaining the Employee Role Shepherd, M. M., & Mejias, R. J. (2016). Nontechnical Deterrence Effects of Mild and Severe Internet Use Policy Reminders in Reducing … Continue reading Cyber-Attacks and Employee Involvement Flow Chart

Phishing Attacks Flow Chart and Outline

  Hypothesis: Educating individuals on the dangers of phishing and other cyber attacks can diminish the impact these attacks have on businesses Proposal Outline Introduction Young, R., Zhang, L., & Prybutok, V. (2007). Hacking into the Minds of Hackers. Information Systems Management, 24(4), 281–287. How attackers are using targeted spear phishing to evade cybersecurity defenses’. (2021, November 30). PC … Continue reading Phishing Attacks Flow Chart and Outline

Web Accessibility Understanding at a University Level: Proposal Outline

My research question(s): How can accessibility be emphasized to development students in a way that facilitates interest and understanding? What common misconceptions do students have going into introduction level classes about accessibility? Hypothesis Common accessibility myths keep students of web development from understanding the importance of accessibility and overcoming these myths at an educational level … Continue reading Web Accessibility Understanding at a University Level: Proposal Outline

Dangers and Precautions while on Public Wi-Fi

    Deliberate Inattention to Security on Public Wi-Fi Flow Chart —Public Wifi— —UserSafety Risks/Improving Safety— —Types of Attacks/Behavior changes/Educating/sharing info— Hypothesis How can users make a difference in their online security when using public Wi-Fi? Introduction (Heading not included) Briefly discuss public Wi-Fi Safety risks when using public Wi-Fi Improving network safety on public … Continue reading Dangers and Precautions while on Public Wi-Fi

Research Proposal Outline and Flowchart for Cyber security in Businesses

HYPOTHESIS:  Understanding viruses and the dangers of hacker attacks in enterprises, as well as the importance of data security.   PROPOSAL OUTLINE: Introduction- A brief overview of the present condition of cyber-attacks affecting businesses all around the world. Knowledge about the types of cyber-attacks that are occurring in the commercial world. Discuss the research proposal … Continue reading Research Proposal Outline and Flowchart for Cyber security in Businesses

Research Outline and Flow Chart

  Flow Chart   Proposal Outline: Hypothesis – The integration of technology in the classroom environment has positive education effects, but is also detrimental to the emotional well being of students when used in excess, having adverse effects on a student’s learning potential. Introduction – Academic Achievement – Kiger, D., Herro, D., & Prunty, D. … Continue reading Research Outline and Flow Chart

Cyber Security Flow Chart and Outline

    Hypothesis: Educating more on viruses and the danger of hacker threats.  Proposal Outline Introduction (heading not included) Firms turn to AI to fight cyber attackers,  Goodwin, B. (2019) What We Talk about When We Talk about “Reasonable Cybersecurity”: A Proactive and Adaptive Approach. Computer & Internet Lawyer, 34(3), 1–8. Miller, K. L. (2017).  … Continue reading Cyber Security Flow Chart and Outline

Cyber-Attack Layout

  Flow Chart: To start the flow chart, 100 randomly selected businesses with under 100 employees from the United States and Europe. 50 businesses will be from Europe, and the other 50 will be from the United States. After gathering the sample size for the study, managers and employees involved with the businesses’ technology will … Continue reading Cyber-Attack Layout