Discuss the theory that support your research model in terms of your outcome and predictors of that outcomes.

timer Asked: Oct 23rd, 2020

Question Description

Discuss the theory that support your research model in terms of your outcome and predictors of that outcomes.

Attached my Dissertation topic for you to understand which topic im refering to.

Unformatted Attachment Preview

Internet of Things-“Big Data Security” Big data related IoT applications are a great benefit to organizations and many other large and small scale industries. Today, the main focus is on security issues in IOT that are associated with big data. Diversifying the concentration of attackers, Hackers on big data and reduce the adverse impact on big data, requires new technological methods in addition to security techniques. The main challenges include capture of data, curation, storage of data, transfer and sharing of data requires a strong security and privacy. The proposed recommendations to overcome security problems are unsolved. I would like to Research and address those security problems and do more research on how they can improve cyber security more effectively. Some of the Proposed Recommendations are Human Computer Interaction, Robust Key and Data Authenticity. Can IoT be secured? Colomo-Palacios [2018],Big data must be protected to prevent malicious data breaches. The growing cyber-security threats imply that organizations should expect and prepare for data breach, and design and implement measures to detect such breaches in a timely manner to minimize their negative impacts and make data secure and data management systems resilient. Organizations are expected to comply with data security regulations and report to both the regulator and individual consumers affected when a data breach takes place. As data volume and computing infrastructures get large, traditional methods of data security mechanisms for securing small-scale data and infrastructure are becoming inadequate [[29]]. Roger et al. [[30]] identified three levels of analytics capability of firms (from low to high), including aspirational, experienced, and transformed. References: Vera-Baquero, A.; Colomo-Palacios, R.; and Molloy, O. Business process analytics using a big data approach. Journal of Management Information Systems. 2018, Vol. 35 Issue 2, p388423. 36p. Chiang, Roger H.L., Grover, Varun, Liang, Ting-Peng, Zhang, Dongsong, Journal of Management Information Systems, 07421222, 2018, Vol. 35, Issue 2
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Related Tags

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors