Assignment Literature review

User Generated

fnvangu_zhqvenw

Business Finance

Description

Hi

I need an assignment of literature review on Assignment on Literature Review: Combating cyber-crime: anti-phishing, anti-spam, anti-fraud techniques.


More than 2500 words


Harvard Referencing

Unformatted Attachment Preview

NIT6130 INTRODUCTION TO RESEARCH ASSIGNMENT 2 – LITERATURE REVIEW by Rachid Hamadi Student ID: 30099999 Table of Contents Table of Contents ................................................................................................................................ ii List of Figures .................................................................................................................................... iii List of Tables...................................................................................................................................... iv 1.1 Broad Scan ................................................................................................................................ 1 1.1.1 Research Journal ................................................................................................................ 1 1.1.2 Filing System...................................................................................................................... 1 1.1.3 Bibliographic file from broad scan..................................................................................... 1 1.2 Focused Review ........................................................................................................................ 2 1.2.1 Updated filing system......................................................................................................... 2 1.2.2 Updated bibliographic file from focused review ................................................................ 2 1.3 Selected Paper1 ......................................................................................................................... 2 1.3.1 Problem Definition ............................................................................................................. 3 1.3.2 Running Example ............................................................................................................... 3 1.3.3 Overview of the Proposed System ..................................................................................... 3 1.3.4 System Architecture ........................................................................................................... 3 1.3.4.1 Module1 ...................................................................................................................... 3 1.3.4.2 Module2 ...................................................................................................................... 3 1.3.4.3 Module3 ...................................................................................................................... 3 1.4 Selected Paper2 ......................................................................................................................... 3 1.4.1 Architecture of the solution ................................................................................................ 4 1.4.2 Experiments........................................................................................................................ 4 1.4.3 Results ................................................................................................................................ 4 1.4.4 Discussion .......................................................................................................................... 4 1.5 Final Outline of the Literature review Chapter ......................................................................... 4 1.6 Introduction ............................................................................................................................... 5 List of References ............................................................................................................................... 6 ii List of Figures NO TABLE OF FIGURES ENTRIES FOUND. iii List of Tables NO TABLE OF FIGURES ENTRIES FOUND. iv Broad Scan 1.1.1 Research Journal 1.1.2 Filing System 1.1.3 Bibliographic file from broad scan Chen, W., & Paik, I. (2015). Toward Better Quality of Service Composition Based on a Global Social Service Network. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1466-1476. Hamadi, R., Benatallah, B., & Medjahed, B. (2008). Self-Adapting Recovery Nets for Policy-Driven Exception. 1 Focused Review 1.2.1 Updated filing system 1.2.2 Updated bibliographic file from focused review Chen, W., & Paik, I. (2015). Toward Better Quality of Service Composition Based on a Global Social Service Network. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1466-1476. Hamadi, R., Benatallah, B., & Medjahed, B. (2008). Self-Adapting Recovery Nets for PolicyDriven Exception Handling in Business Processes. Distributed and Parallel Databases, 1-44. Holzinger, A., Schantl, J., Schroettner, M., Seifert, C., & Verspoor, K. (2014). Biomedical text mining: state-of-the-art, open problems and future challenges. Interactive Knowledge Discovery and Data Mining in Biomedical Informatics (pp. 271-300). Springer Berlin Heidelberg. Selected Paper1 In this section, the approch of Hamadi et al. (2008). Thr authors proposed ….. This section is organised as folows. In Section 1.4.1 …. 2 1.3.1 Problem Definition 1.3.2 Running Example 1.3.3 Overview of the Proposed System 1.3.4 System Architecture 1.3.4.1 Module1 1.3.4.2 Module2 1.3.4.3 Module3 Selected Paper2 Another interesting solution for the investigated problem is the QWERTY framework (Holzinger, Schantl, Schroettner, Seifert, & Verspoor, 2014). 3 1.4.1 Architecture of the Solution 1.4.2 Experiments 1.4.3 Results 1.4.4 Discussion Final Outline of the Literature review Chapter 1. Introduction 2. Selected Paper1 2.1 Problem Definition 2.2 Running Example 2.3 Overview of the Proposed System … 3. Selected Paper2 3.1 Architecture of the Solution 3.2 Experiments … 4. Put other papers to be reviewed here even though they have not been reviewed above (optional) 4 5. Discussion 6. Conclusion (This is just an example. Please come up with your own outline). Introduction 5 References Chen, W., & Paik, I. (2015). Toward Better Quality of Service Composition Based on a Global Social Service Network. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1466-1476. Hamadi, R., Benatallah, B., & Medjahed, B. (2008). Self-Adapting Recovery Nets for PolicyDriven Exception Handling in Business Processes. Distributed and Parallel Databases, 1-44. Holzinger, A., Schantl, J., Schroettner, M., Seifert, C., & Verspoor, K. (2014). Biomedical text mining: state-of-the-art, open problems and future challenges. Interactive Knowledge Discovery and Data Mining in Biomedical Informatics (pp. 271-300). Springer Berlin Heidelberg. 6 Marking Criteria Broad Scan  Research journal  Filing system  Bibliographic file from broad scan Focused Review  Updated filing system  Updated bibliographic file from focused review Comprehensive Critique  Evaluation statements of two HD (80%-100%) A up-to-date research journal is kept, filing system is shown with required folder and subfolder settings in good organization, bibliographic information from broad scan is stored in separate files based on the keywords used for search, rough analysis on the literature collection is applied to filter out irrelevant documents Focused review is implemented with updated filing system with and bibliographic information separate folder and subfolders apart from broad scan, advanced filtering method is used to keep only the highly relevant documents with appropriate explanation of selection Well-written evaluation statements for two selected papers are D (70% - 79%) A up-to-date research journal is kept, filing system is shown with required folder and subfolder settings in good organization, bibliographic information from broad scan is stored in separate files based on the keywords used for search C (60% - 69%) A up-to-date research journal is kept, filing system is shown with required folder and subfolder settings, bibliographic information from broad scan is stored in a single file P (50% - 59%) A up-to-date research journal is kept, simple filing system is shown, bibliographic information from broad scan is stored in a single file N (0% - 49%) No complete broad scan is implemented, such as no filing system is shown, no bibliographic information is collected or submitted, or no research journal is provided Focused review is implemented with updated filing system with and bibliographic information separate folder and subfolders apart from broad scan, a filtering method is used to keep only the highly relevant documents Focused review is implemented with updated filing system with and bibliographic information separate folder and subfolders apart from broad scan Focused review is implemented with updated filing system and bibliographic information No complete focused review is implemented, such as filing system is not updated, or bibliographic information is not updated Comprehensive critique is implemented by submit a written Comprehensive critique is implemented by submit a written Comprehensive critique is implemented by submit a written No evaluation statement is submitted, or only one paper is selected papers presented, insights from these two papers are highlighted in content Final outline of the literature review chapter Demonstrate capability to create hieratical outline of chapter is presented up to four levels of titles in logical order to provide clear overview organization of the entire chapter Introduction section Well-written introduction section with careful organization to give big picture and insight of current development of information technology used in the selected research area summary of evaluating two selected papers with detailed information and analysis of listed aspects Demonstrate capability to create hieratical outline of chapter is presented up to three levels of titles in logical order to provide overview organization of the entire chapter Well-written introduction section to state the current development of information technology used in the selected research area summary of evaluating two selected papers in terms of listed aspects summary of evaluating two selected papers evaluated Demonstrate capability to create hieratical outline of chapter is presented up to two levels of section and subsection titles in logical order to show organization of the entire chapter Brief introduction in a short paragraph to state the content of the literature review chapter Demonstrate capability to create hieratical outline of chapter is presented at least one level of section titles of the entire chapter Failed to provide an outline of the chapter, or provide an outline for other chapters or the entire thesis Very brief introduction in couple sentences to state the content of the literature review chapter No introduction section is written or the content is for entire thesis, but not literature review chapter NIT6130 Introduction to Research Assignment 2 – Literature Review Semester 2, 2015 Due Date: Submission Requirement: Value: 11:59pm, Friday, Week 7 submit online via a link in Assessment on VU Collaborate 25% of semester assessment Objective: The purpose of this assignment is to help students getting familiar with the process of conducting an literature review in a research project. Students will experience all three phases of producing an literature review on the topic they selected for thesis writing. Tasks: Conduct and write up the literature review section of your research proposal or thesis of the research topic you have selected. 1. Conduct a broad scan of the selected research topic. a. Record a research journal i. Keep a two-week (at least) research journal (from the day you have your lecture and lab in Week 6 until the submission due day, including all the actions from broad scan, focused review and comprehensive critique). ii. The research journal should record your idea, feeling, and action related to your thesis, such as the date, the task, the action and any comment you have. (Example as below) b. Develop a filing system i. List all the sources you used to collect the literature, including the libraries (VU library), digital databases, search engine (i.e. Google Scholar). ii. List all the keywords you have used to collect the literature from each source in above list. iii. Record the number of the literature returned, and the number of the literature finally collected. (Example as below) Source Keywords Used VU Library “Network Security” “Wireless Network Security” “Sensor Network Security” NIT6130 – Introduction to Research No. Returned Literature 352 248 167 No. Collected Literature 20 25 24 Page 1 of 3 c. Get full bibliographic information i. Create a file to record all the bibliographic information of the literature that you have collected and stored in your filing system. ii. You are free to choose any reference tool or file format to record the bibliographic, including MS Word, MS Excel, EndNote, Reference Manager, LaTex or ASCII in HTML (.txt) 2. Conduct a Focused review a. Evaluate your literature collection i. Check the title, the author(s), the source, the document type, the published date, and read the abstract to carefully select the most relevant literature. ii. Based on the evaluation results, you need to consider whether you will collect more literature or you need to discard some of them to narrow down your research problem. A recommended number is around 50 to 100. You also need to seek the suggestion from your instructor and/or supervisor. b. Update your filing system. You need to update the table created for broad scan. (Hint: There must be some changes in the filing systems from broad scan and focused review.) c. Update your bibliographic file. (Hint: The change of your bibliographic file must match with the updated filing system.) d. Download the full text of the literature kept after your evaluation. 3. Conduct a comprehensive critique a. Select two most relevant papers from your literature collection and undertake a careful reading to evaluate them according to following aspects if relevant (refer to Week6’s lecture slides for detailed questions, page 20-23): i. Research problem ii. Literature review iii. Subjects iv. Instrumentation v. Data collection, presentation, and analysis vi. Summary and discussion vii. Research type viii. Overall evaluation (Hint: You can use the above aspects as the subtitles for your evaluation statement. It is recommended to write your opinions in paragraph rather than only briefly list in bullets. You are expected to put your own understanding of the research work done in the literature.) 4. Provide a final outline of your literature review chapter. You are expected to provide a table of content of the literature review chapter, listing chapter title, subtitles, and subsubtitles if applied. No page number is required but a clear structure needs to be shown. 5. Write an introduction section that you will have in the literature review chapter. You can follow the sample provided in Week7’s lecture slides, from page 11.) NIT6130 – Introduction to Research Page 2 of 3 Marking criteria Assessment Criteria: Broad Scan  Research journal  Filing system  Bibliographic file from broad scan Focused Review  Updated filing system  Updated bibliographic file from focused review Comprehensive Critique  Evaluate statements of two selected papers Final outline of the literature review chapter Introduction section Mark 2 2 2 2 2 Total NIT6130 – Introduction to Research 4*2=8 2 5 25 Page 3 of 3
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Related Tags