A critical part of this course is identifying a suitable topic for you research proposal. This can be arrived at in several ways: • exploring an area you are already interested in or an emerging area...

1 answer below »
A critical part of this course is identifying a suitable topic for you research proposal. This can be arrived at in several ways: • exploring an area you are already interested in or an emerging area of technology like artificial intelligence or virtual reality • considering the application of specific types of IT to an application area you have knowledge of such as healthcare or agriculture • following up on an aspect of IT you found interesting in your course • investigating a topical issue from the news, such as a recent cybersecurity threat or the introduction of electronic health records The list below is of some sample topics and research questions which students have considered in recent semesters. You cannot use these directly – you must come up with your own topic. However they give an indication as to the sort of topic which would be suitable for your research proposal. If you are having problems identifying a topic, or have concerns that your topic may not be suitable, please discuss this with your tutor and/or lecturer. What are the user’s perceptions and understanding of the security implications of using static and dynamic web pages? How are data mining techniques used to detect frauds in the banking sector? What are the causes of post-implementation issues in enterprise systems? How can visualisation contribute to effective data analysis? How can cloud computing facilitate organisational communication? How can wearable sensors aid in health monitorization? Scope and Implementation of Artificial Intelligence in the Tesla Roadster Can a predictive model using big data analytics help prevent credit card fraud? How does informed understanding of security processes by the user effect Android device security and its vulnerabilities? The use of artificial Intelligence in health What can Australia’s My Health Record System learn from recent health data breaches? Will the application of the Internet of Things in the transportation area affect people’s travel patterns? The involvement of information technology in agriculture. Cloud computing in healthcare Social media data mining for business intelligence The application of big data analytics in healthcare: Awareness and perceived importance of healthcare stakeholders
Answered Same DayAug 15, 2021

Answer To: A critical part of this course is identifying a suitable topic for you research proposal. This can...

Amit answered on Aug 16 2021
168 Votes
Title of the assignment:
Student’s name:
Student ID:
Professor’s name:
Course title:
Date: 8/
16/2019
Table of Contents
1.    Research proposal    3
2.    References:    4
1. Research proposal
The uses of Android devices have increased in modern time. The proper understanding of security processes by the user of that device can help in easy identification of vulnerabilities. The Android devices contain the personal and business information of individual user, so, its security is most important. With proper understanding of security processes, the user can secure all the data stored on the Android devices. The vulnerabilities in Android devices can be caused by different sources and many attackers are always ready to create any such attack. The attacks can cause vulnerabilities in Android devices...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here