You can choose the focus and topic which you can do the best for the research report in the areas of Internet of Things.ASSESSMENT TASK 4: Research Report:The Research Report is the independent...

1 answer below »
You can choose the focus and topic which you can do the best for the research report in the areas of Internet of Things.ASSESSMENT TASK 4: Research Report:The Research Report is the independent research component for this subject. The report must be prepared individually, i.e. one report per student (not per team). The report must apply scientific research methodologies and deliver literature review relevant to the team project.

1. Please check all of the files I attached to see the task description and criteria sheet.

3. It is better to use academic sources, such as journal articles, research papers and academic books. Number of sources for each report should be more than 10.

4. The writing should be academic.

5. In-Text Citations are required, and make a list of references for them, the list of references is not counted into the word count, the citation style is APA.

6. A paragraph of introduction and a paragraph of conclusion for the research report should be written, the article body is between the introduction and conclusion.

7. All of the data, images and tables should be with a title below, and show the sources if it is not original, and include them in the list of references.

8. Plagiarism report (Turnitin) should be provided.

9. Must have Abstract at the beginning.
Thank you very much.


ASSESSMENT TASK 4: CRITERIA SHEET Criteria Exemplary (9, 10) Good (7, 8) Satisfactory (5, 6) Limited (2, 3, 4) Very Limited (0, 1) Abstract 10% - Excellent summary of contents containing problem statement, approach, and result Exhibits aspects of exemplary (left) and satisfactory (right) - Satisfactory summary of contents containing some of problem statement, approach, and result Exhibits aspects of satisfactory (left) and very limited (right) - No or very limited abstract Content (research) 30% - Identifies, explains and prioritises key issues in a complex IT related situations, drawing upon relevant theory and real or hypothetical examples. - Demonstrates clear mastery of the material in the topic area, and shows excellent ability to synthesise and abstract knowledge - Identifies and explains key issues in a routine IT related situations. - Demonstrates moderate mastery of the material in the topic area, and shows moderate ability to synthesise and abstract knowledge - Demonstrates little mastery of the material in the topic area, and shows no ability to synthesise and abstract knowledge Case study (implementation) 30% - Excellent application of research and concepts to progress work on project - Excellent alternatives generated and problem solving skills used - Satisfactory application of research and concepts to progress work on project - Satisfactory alternatives generated and problem solving skills used - Minimal application of research and concepts to progress work on project or missing - Minimum alternatives generated and problem solving skills used or missing Conclusions 10% - Excellent evaluation of own research and implementation - Excellent conclusions regarding future work - Satisfactory evaluation of own research and implementation - Satisfactory conclusions regarding future work - Evaluation of own research and implementation missing or is minimal - No conclusions or directions for future work Readability 5% - Excellent use of English and grammar, using only formal academic 3rd person writing - Excellent progression of topics - A highly conventional academic writing style, including the use of appropriate terminology and unbiased language - Satisfactory use of English and grammar - Satisfactory progression of topics - A largely conventional academic writing style, including the use of appropriate terminology and unbiased language - Unsatisfactory writing skills - Unsatisfactory progression of topics - Unclear explanation for all concepts Structure 10% - Highly appropriate structure and professional format, according to the genre/text type and task requirements, including clear attention to word length limit, and effective use of sections, paragraphs and/or links - Professional report format, including cover page, table of contents, page numbers, labelled images - Largely appropriate structure and format, according to the genre/text type and task requirements, including attention to word length limit, and use of sections, paragraphs and/or links - Report presentation is satisfactory - Inappropriate structure and format, according to the genre/text type and task requirements, with no/limited attention to word length limit, and use of sections, paragraphs and/or links - Report is not presentable and does not look professional Referencing 5% - Adheres to IEEE/APA/Harvard referencing conventions in in-text citation, presentation of tables/figures and reference list, with next-to-no errors - Mostly adheres to IEEE/APA/Harvard referencing conventions in in-text citation, presentation of tables/figures and reference list, with some errors - No referencing or very limited use of references James Cook UniversityPage 1[Insert Subject Code]
Answered Same DayApr 04, 2021

Answer To: You can choose the focus and topic which you can do the best for the research report in the areas of...

Soumi answered on Apr 30 2021
152 Votes
Running Head: THE DILEMMA FOR USING IOT    1
THE DILEMMA FOR USING IOT         5
CHOOSING BETWEEN PRIVACY CONCERN AND EASE OF USE: THE DILEMMA FOR USING IOT
Abstract
The current research report aims at discussing the dilemma, users face while using IoT technology in their daily lives for its providing of ease, on one-hand and privacy concerns on the other. The research report shows that considering the remarkable ability to provide data for the refinement of daily life routine of the users, the development stage, the hardware vulnerability has created and widened the scope of privacy and security breach. The report gives in depth details about the related aspects of the research, in the form of a research report, while in case using the right set of methods, research methodology is provided, which gives details about the primary data collected, which u
sed both qualitative and quantitative data.
Table of Contents
Introduction    4
Literature Review    4
Dynamics of IoT    4
Success Factors of IoT    6
Use of Data Mining in IoT    7
Contribution of IoT for Higher Convenient Living    8
Risks Associated with the use of IoT    9
Role of Stakeholders in IoT    10
Future Potential of IoT technology    11
Research Methodology    12
Research Philosophy    12
Research Design    12
Research Approach    13
Research Type    13
Research Strategy and Data Collection Technique    13
Data Source, Sample and Size of Sample    14
Data Analysis Technique    14
Ethical Consideration    14
Conclusion    15
References    16
Introduction
    The development of the Internet of Things, better known as IoT is the latest offering of the information and communication technology and is a significant step towards a more data driven as well as human and technology interaction-based environment. The use of IoT is completely reliant on the use of collection, processing and responding to human commands, feedbacks and actions through internet power devices, which are integrated with regular household staffs, a wider expansion from typical communication devices such as computers, laptops and smartphones.
IoT devices collect data on regular basis and remain in touch with users all day long, monitoring their activities consistently and sending the details to central database for processing. The use of IoT has made users’ experiences better with its accuracy, fast response and smart identification of commends, however, IoT, due to its nature of collecting data from the users creates privacy concerns and although the incidents of privacy breaches by IoT devices have been covered by accidental programming flaws, it is worth the mention that the collection of data on regular basis, makes the users monitoring aspect concerning. As IoT offers both positive as well as negative aspects of its usage the users are left in dilemma, whether to use it or not and is the current topic of the report.
Literature Review
Dynamics of IoT
    The development of the RFID or Radio Frequency Identification technology in the latter half of the 1990s and the existing benefits of data mining technology paved the way for Internet of Things (IoT). As stated by Tselios, Politis and Kotsopoulos (2017), IoT is a hardware-software oriented data mining system, which collects data through the use of hardware, uses the internet for transmitting the collected data to a central database and use software technology to identify a pattern that would provide significant details to its users. IoT has evolved over time, as mentioned by Dhar and Gupta (2016), in the earlier times IoT devices were used for data collection and software based solution providing, especially in the fields of business and healthcare, while the used IoT setups had single nodes or data collecting hardware (electronic sensors or nods).
However, with the development of better internet connectivity and technological innovation, IoT has become capable of interacting with the users by not only collecting data from the users and just presenting a data driven pattern, it has evolved into a system, in which users’ data from different sections of daily lives are collected with the use of multiple nod-based network system and controlling the actions of hardware through internet connectivity and algorithm based data processing.
    IoT has been adapted into the human society slowly, although the future potential of its usage is highly valued, for its ability to use data mining on personal levels, pattern development for hazard identification and help self-monitor daily activity. As assessed by Furst, Chen, Kim, and Bonnet (2018), the ability to use user data for pattern identification, IoT make live simpler and more well regulated. The core idea of IoT is using sensors for tracking users’ activities and acting accordingly to provide maximum conveniences as seen in the cases of smart lights, locks and speakers, where each type of device work consistently, given that the internet connectivity is available. IoT is capable of reaching not only domestic but also commercial sector for its ability to develop network through multiple sensor-based nodes, which offer better observation, data collection and their processing at daily basis.
Success Factors of IoT
    The used hardware for IoT technology, its quality, compatibility, accuracy and longevity, is a major success factor for IoT. As affirmed by Ma, Liu, Zhou and Zhao (2016), the hardware used for IoT technology requires collecting data by being in close proximity of the users, remains functional under environmental changes and contain sensor for external signal response and internet communication system for data transmission and reception, therefore, its quality, compatibility, nature of sensor, accuracy and longevity affect the effectiveness of IoT and its performance. The hardware used as nods, must also have the mechanical capacity to execute actions such as regulating flow of electivity, running and closing circuits or, moving locks; or recording visual or auditory data.
    The effectiveness of IoT depends on the collection, transmission, processing and retrieval of data, which makes the internet connectivity a critical success factor for IoT. As opined by Koh, Nevat, Leong and Wong (2016), IoT is expected to response promptly with sensory interaction and therefore, the transmission of data and its processing needs to be done fast, which requires fast internet connections. The heavy reliance on the high-speed internet connection for successful installation of usage of IoT can be made evident from the fact that IoT is highly adapted in countries, where the internet connectivity is available, affordable and has a higher speed of data transmission.
    Thirdly, value for money propositions is an active success factor for IoT and its application. As noted by Rutayisire, Markon and Raymond (2017), the use of high-speed internet modems, the use of sophisticated micro sensors and the research and development involved in software based algorithm determination, makes the IoT technology production and maintenance cost high. Considering the high pricing of IoT, any technical and security-oriented issues make the value for money aspect decline in quality, taking away the reliability of the technology; therefore, retention of the value for money proposition makes the IoT attractive to the customers and clients, who use it in domestic as well as commercial environments.
    Lastly, the availability of a functional ecosystem is also deemed as a success factor for IoT. In order to formulate accurate algorithms, identifying the patterns of usage, the upgrading of technology used, offer after sale services and to scale the users’ usage patterns a multitude of different data must be connected with one another to formulate a collective whole. As mentioned by Yunge, Park, Kindt, Pravadelli and Chakraborty (2016), the more different IoT devices send their data to a central database, the better information are processed, which makes the development of an ecosystem, essential, otherwise, IoT would remain outlets for personal data collection and processing, a sort of individual focused data mining.
Use of Data Mining in IoT
    The development of the sensors, the integration of the IoT devices through internet will not ensure successful IoT ecosystem development, unless the collected data is processed properly and therefore, data mining process is considered to be an integral part of IoT. As mentioned by Mahdavinejad et al. (2018), data mining process identifies the data based patterns, which are later used for the formulation of the algorithms that gives...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here