Discuss the theory that support your research model in terms of your outcome and predictors of that outcomes.

funyvav2401
timer Asked: Oct 23rd, 2020

Question Description

Discuss the theory that support your research model in terms of your outcome and predictors of that outcomes.

Attached my Dissertation topic for you to understand which topic im refering to.


Unformatted Attachment Preview

Internet of Things-“Big Data Security” Big data related IoT applications are a great benefit to organizations and many other large and small scale industries. Today, the main focus is on security issues in IOT that are associated with big data. Diversifying the concentration of attackers, Hackers on big data and reduce the adverse impact on big data, requires new technological methods in addition to security techniques. The main challenges include capture of data, curation, storage of data, transfer and sharing of data requires a strong security and privacy. The proposed recommendations to overcome security problems are unsolved. I would like to Research and address those security problems and do more research on how they can improve cyber security more effectively. Some of the Proposed Recommendations are Human Computer Interaction, Robust Key and Data Authenticity. Can IoT be secured? Colomo-Palacios [2018],Big data must be protected to prevent malicious data breaches. The growing cyber-security threats imply that organizations should expect and prepare for data breach, and design and implement measures to detect such breaches in a timely manner to minimize their negative impacts and make data secure and data management systems resilient. Organizations are expected to comply with data security regulations and report to both the regulator and individual consumers affected when a data breach takes place. As data volume and computing infrastructures get large, traditional methods of data security mechanisms for securing small-scale data and infrastructure are becoming inadequate [[29]]. Roger et al. [[30]] identified three levels of analytics capability of firms (from low to high), including aspirational, experienced, and transformed. References: Vera-Baquero, A.; Colomo-Palacios, R.; and Molloy, O. Business process analytics using a big data approach. Journal of Management Information Systems. 2018, Vol. 35 Issue 2, p388423. 36p. Chiang, Roger H.L., Grover, Varun, Liang, Ting-Peng, Zhang, Dongsong, Journal of Management Information Systems, 07421222, 2018, Vol. 35, Issue 2
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors