I. Introduction – Statement of the problem
A. What is the problem or issue you will be addressing? What is at stake in the
research? Why is it important to conduct the study now?
B. A general overview of how will you carry out the research.
C. A very general introduction of yourself and why you are qualified
II. Review of the literature/ Background and more details on research and its uniqueness
A. General background of the topic.
B. Review of current research in the field: what studies have already been done on the
subject and what were the results. Review at least 7-9 relevant studies
C. Uniqueness: The review of literature background should lead to your contribution;
explain what you will add to current research or lack thereof and address what makes
this project interesting, unique, and timely
More instructions:
1) What is the research topic/question? Why is it important? Why is it timely? Why is it unique? You do not have to address each of these questions individually. You should start the statement of the problem with: “I propose to…” Be very specific about what you want to do.
2) One or two sentences explaining your methodology or how you will tackle the research. For example in the first sample, the writer states rather directly: “I propose to do this through coursework at the University, independent research, and interviews with former members of the Women’s Alliance.” You may want to be a little more detailed, but not much more. It is a good summary of what she plans to do.
3) Introduce yourself, provide your qualifications, and explain why you are interested in the topic.
Introduce yourself, provide your qualifications, and explain why you are interested in the topic.
Sources:
1) Catal, C., Ozcan, A., Donmez, E., & Kasif, A. (2023). Analysis of cyber security knowledge gaps based on cyber security body of knowledge. Education and Information Technologies, 28(2), 1809-1831. https://doi.org/10.1007/s10639-022-11261-81)
2) Alzahrani, L. (2021). Statistical Analysis of Cybersecurity Awareness Issues in Higher Education Institutes. International Journal of Advanced Computer Science and Applications, 12(11)https://doi.org/10.14569/IJACSA.2021.01211
3) Nweke, L. O., Bokolo, A. J., Mba, G., & Nwigwe, E. (2022). Investigating the effectiveness of a HyFlex cyber security training in a developing country: A case study. Education and Information Technologies, 27(7), 10107-10133. https://doi.org/10.1007/s10639-022-11038-z3)
4) Tisma, M., & Andric, J. (2021). Importance of cyber security awareness and e-learning motivation for cyber security in reshaping the education. Journal of Information Systems & Operations Management, 15(2), 284-296. http://mutex.gmu.edu/login?url=https://www.proquest.com/scholarly-journals/importance-cyber-security-awareness-e-learning/docview/2628335059/se-24)
5) Noone, G. (2023, March 31). Employers are desperate for cybersecurity skills. Hiring practices are turning people away. Tech Monitor. https://techmonitor.ai/technology/cybersecurity/cybersecurity-jobs-employers-talent
6) Rezai, N. (2021, October 25). How We Can Narrow the Talent Shortage in Cybersecurity. Dark Reading. https://www.darkreading.com/careers-and-people/how-we-can-narrow-the-talent-shortage-in-cybersecurity
7) Donegan, K. (2019, August 2). Lack of cybersecurity skills fuels workforce shortage. Security. https://www.techtarget.com/searchsecurity/feature/Lack-of-cybersecurity-skills-fuels-workforce-shortage
8) Michael, U. (2022, August 2) Challenges and way ahead for cybersecurity workforce in today’s federal government. (n.d.). https://www.disa.mil/en/NewsandEvents/2022/Cybersecurity-Workforce