This is to work on a research project that’s divided into phases as shown below and in the attached requirements file and a shared survey to guide on the topic. The project timing will be extended upon delivering each phase (further requirements and explanation will be provided later on each phase)
– Phases 1+2+3 (Needed to be delivered by maximum 2 days from now)
– Phase 4 (Needed to be delivered by maximum of 3 days after delivering phases 1+2+3)
– Phase 5 (Needed to be delivered by maximum of 4 days after delivering phase 4)
– Phase 6 (Needed to be delivered by maximum of 4 days after delivering phases 5)
——————————————————————————————————————————————————————-
Specifications on Phase 1: full requirements can be found on the attached file. The topic needs to be “Phishing Detection”.
- A paragraph describing the topic and its significance and application.
- A paragraph indicating the motivation for selecting the topic. (reasons)
———————————————————————
Specifications on Phase 2:
-choose initial 45-50 references (such as academic journals & books & etc) for the research (preferred to be published on 2017 and later, and preferred to be cited on ISI “Web of Science” (I can help you in downloading references that are not available for free in the internet)). I’ve already dowloanded 35+ articles and cited them and I’ll be sharing them with you, however, you are not required to use them
-create a folder and upload all the references
-create an excel sheet and cite all the chosen references, and next to each cited reference create a link to the reference in the same folder “SM”
———————————————————————
Specifications on Phase 3: this phase is conduct an evaluation on the chosen initial references list 45-50, and to choose 27-30 from that list based on the conducted evaluation (full requirements and guidance can be found on the attached file)
-in the same created excel sheet, you’ll need to create a new tab to conduct the evaluation for the initial chosen list. In this tab you’ll list all references names in the rows, and columns for the evaluation criteria and score. For scoring, use a scale 0 or 1 or 2 to make the evaluation easier where 0 is too bad & 2 very good and meet the requirements.
-now after conducting the evaluation, you’ll choose 27-30 from the list based on the conducted evaluation and score. This can be done by calculating the final evaluation score for each reference and accept only references that score 80% or more (for example if you use the scale 0-2 and you have 5 criteria to evaluate from, then if the reference get a score of 8 out of 10 will be accepted)
-After choosing the accepted and rejected references, you’ll go back to the first tab in the excel sheet (where you have all references and links to sources) and add links to the evaluation tab and the status of the reference weather accepted or rejected.
Please keep in mind that the research will be base on 4-5 categories and as much as possible subcategories (sub-subcategories are not acceptable)
For example if you choose the topic “phishing detection”, the categories will be URL-based, visual-similarity based, etc, (up to 5) similar to the sent survey.
This note important to be taking in consideration during the initial references search.
Specifications on Phase 4: is to write annotated bibliography for all of the accepted articles (27-30) by writing 3 short paragraphs for each article similar to the attached picture and by following the below specifications and the sent requirements earlier. Please note that each item of the below specifications should be very brief 1-2 sentences. Also, below the article name and above the paragraphs, you should add 2 links (1 for accessing the article in the folder, and 1 for accessing the conducted evaluation in the Excel sheet)
– Paragraph 1:
1) Describe the Focus of the article (length is 1-2 sentences/1-2 lines maximum, always found on the abstract of the article)
2) Describe the usefulness of the article (length is 1-2 sentences/1-2 lines maximum, always found on either the abstract or conclusion or both in the article)
3) Briefly describe the limitation
– Paragraph 2: (how reliable is the article)
1) Briefly describe what audience the article is intended for
2) Briefly evaluate reliability of the article (from the evaluation you’ve conducted)
3) Briefly describe the author of the article
– Paragraph 3:
1) Briefly describe the methods of research used in the article (1-2 sentences)
2) Briefly discuss any conclusions the author(s) may have made in the article (in your own words)
3) Briefly describe your reaction to the article (what do you think of the paper)
4) describe the relationships to other used references


0 comments