Technology Evaluation Study Plan – Detailed Assignment Description

Choose one of the student-written Technology Selection papers from the list posted by your instructor in the Week 7 conference.

Read your chosen Technology Selection paper to learn more about the selected technology. Next, consider what type of formal evaluation study could be used to learn more about this technology and how it is likely to interact with people, processes, and technologies. Then, design a formal evaluation study which could be used to obtain more information about one or more of the following:

  • characteristics (features and capabilities) of the technology
  • interactions among technologies, people, environments, and processes (use cases or scenarios)
  • risks or vulnerabilities associated with adoption of this technology
  • costs and benefits associated with adoption of this technology

Choose Your Evaluation Method

Your evaluation study design must use one of the following:

  • Case Study
  • Delphi Study (panel of subject matter experts)
  • Quasi-Experiment (e.g. penetration testing or pilot testing in a controlled environment)
  • Pilot Implementation (in a demonstration environment)

See the Technology Evaluation Methods module in the Week 2 conference for detailed descriptions of each of these types of evaluation methods.

Design Your Study

Identify the specific questions that your formal evaluation study will address. These questions must be security-focused and should address: threats, vulnerabilities, attacks, countermeasures, risks, risk mitigations, etc. Your design should include a description of the specific security issues which will be tested or security capabilities which will be evaluated. Use standard terminology when writing about security issues (see the rubric).

Develop Your Evaluation Study Plan

Use your study design to prepare a high-level plan for your evaluation study. Your plan must include the following:

  • Introduction
    • description of the emerging technology and justification for including it in an evaluation study
  • Research Question(s)
    • These must be security focused (i.e. focused on cybersecurity objectives such as confidentiality, integrity, availability, etc.) and should address: threats, vulnerabilities, attacks, countermeasures, risks, risk mitigations, etc.  
    • Use “how” or “what” questions (writing good “why” questions is beyond the scope of this course).
    • Examples
      • What vulnerabilities exist that could be attacked to compromise confidentiality?
      • How could an attacker compromise availability?
    • For each research question, provide a brief description of a scenario or use case which could be used to answer the question. Your description should be one paragraph (no longer).
  • Methods
    • high level design of the study (focus upon the evaluation model and your research questions)
    • description of how the technology will be incorporated or used in the study (including specific security issues which will be tested or security capabilities which will be evaluated)
    • notional system or network architecture diagram showing the pilot test environment (only if you are doing a pilot study)
  • Limitations or Special Considerations
    • any special considerations or security concerns which must be addressed (e.g. “clean room,” test data sanitization, or isolation environment to prevent the pilot study from causing harm to operational systems)
  • Timeline of Events (Notional)
    • A notional timeline (expressed in days or months after start date) for your study

Notional Timeline of Events

The notional timeline of events (stated in days or months after start) that provides an estimate of how long you expect your evaluation study to take. For a Delphi Method study, your study could take as little as a day or two. For a Delphi Method Study, include the number of “rounds” and how long each round will be (the time allotted for experts to consider information and reply back with their opinion on the questions or issues). For a case study, quasi-experimental, or pilot implementation design, your study may span several months; in this case, divide your timeline into phases (setup, testing, reporting).

Cost Estimate Is Not Required

Normally, an evaluation study plan will include a cost estimate. For this course, we will NOT be including cost elements in our evaluation study plans as the information required to develop these items is not readily available to students. If you wish to address this area of a study plan, limit your discussion to a brief listing of the cost elements (people, technologies, facilities) and state that a cost estimate will be provided separately.

Document Your Plan

Your Technology Evaluation Study Plan should be at least three pages in length but no more than ten pages (excluding the title page and references page). This should be a high level design that can be read quickly. Your study plan must contain the five major sections defined above and comply with the formatting guidance provided by your instructor.

Additional Information

  1. Consult the grading rubric for specific content and formatting requirements for this assignment.
  2. Your 5 to 10 page study plan document should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.
  3. Your paper should use standard terms and definitions for cybersecurity.
  4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.  
  5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count. 
  6. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 
  7. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).
Research Paper 101
Calculate your paper price
Pages (550 words)
Approximate price: -

Reasons to trust Research Paper 101

On Time Delivery

We pride ourselves in meeting the deadlines of our customers. We take your order, assign a writer but allow some more time for ourselves to edit the paper before delivering to you. You are guaranteed a flawless paper on a timely manner...

24x7 Customer Live Support

Our team at Research Paper 101 is committed to handling your paper according to the specfications and are available 24*7 for communication. Whenever you need a quick help, you can talk to our writers via the system messaging or contact support via live chat and we will deliver your message instantly.

Experienced Subject Experts

Online Experts from Research Paper 101 are qualified both academically and in their experiences. Many are Masters and Phd holders and therefore, are qualified to handle complex assignments that require critical thinking and analyses...

Customer Satisfaction

We offer dissertation papers as per students’ wishes. We also help craft out the best topics and design concept papers. By ordering with us, you are guaranteed of defending and making through those hard faced professors in the defense panel!

100% Plagiarism Free

We at Research Paper 101 take plagiarism as a serious offence. From the start, we train our writers to write all their papers from scratch. We also check if the papers have been cited appropriately. Our website also has a tool designed to check for plagiarism that has been made erroniusly. In essense, the paper you get will be 100% legit...

Affordable Prices

We understand that being a student is very challenging, some students balance between work and studies in order to survive. We therefore offer pocket friendly rates that are very competitive in the market.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.

Admissions

Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.

Reviews

Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.

Reviews

Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.

error: