Order ID:89JHGSJE83839 | Style:APA/MLA/Harvard/Chicago | Pages:5-10 |
Instructions:
Big Data Increases Cyber Security Vulnerabilities in Intelligent Transportation
Need help in writing a literature review for below table of contents in APA 7 without any plagiarism. 70 pages with 75 references for Research Topic: Examine the Effects of Big Data on Cyber Security Vulnerabilities in Intelligent Transportation Systems. I have also attached how I started and need help with the attached table of contents.
The theoretical framework used is a Grounded theory which I have added below.
This dissertation investigates the problem “Big Data increases cyber security vulnerabilities in Intelligent Transportation systems due to cyber-attacks” (Aldhaheri, et al., 2020; Bubenikova, et al.,2014; Coppola and Silvestri, 2019; Cui, et al., 2018; Harvey and Kumar, 2020; Liang, et al., 2019; Mahmood, et al., 2018; Petit, 2015; Qureshi and Abdullah, 2013).
Many Researchers utilize theoretical frameworks to illustrate the research problem and provide a practical approach for the study. Huang, S. E. used Empirical Study to investigate cyber security concerns in connected vehicles – Traffic control systems (CV-TCS) and built a cyber security framework for CV-TCS systems (Huang, S. E. 2020). And Thompson, E. E. utilized a qualitative research method using Grounded Theory to understand the end-users of enterprise information technology systems and their practices to maintain health world facts and analyses data with no predetermined ideas or hypotheses (Glaser & Strauss, 1967).
American sociologists Glaser and Strauss developed the grounded theory methodology in 1967 to describe a new qualitative research method. This study adopted an investigative research method with no preconceived hypothesis and used a continuous relative data analysis. Glaser and Strauss believe that the Theory obtained by this method is genuinely grounded in the data. Hence the reason for calling this methodology “grounded theory” (Glaser & Strauss, 1967). This study will begin with the general concept of how recent advancements in big data technologies could address major cyber threats to Intelligent Transportation Systems. Interview transcripts from participants will be collected and analyzed to extract common themes. (Moustafa et al., 2018). Using Grounded Theory, we can determine whether cyber security concerns are present in Intelligent transportation systems and help research the vulnerability of ITS due to cyberattacks.
The Centers for Medicare & Medicaid Services (CMS) formed its no-pay policy based on the growing work of National Quality Forum (NQF) of “never events.” Meaning, CMS will no longer pay for certain conditions that result from what might be termed poor practice or events that should never have occurred while a patient was under the care of a healthcare professional.
Discuss specific examples of “never events” and their impact in your workplace.
What issues are you considering for your clinical project and why?
Submission Instructions:
Your initial post should be at least 500 words, formatted and cited in current APA style with support from at least 2 academic sources.
Each of your answers should be written using your own words. Do not copy and paste from your textbook or an Internet source. Ensure you cite your work and add reference(s) at the end of your journal. These should be the sources you are citing in your work. You should not need to do research from additional resources unless the question specifically asks you to do so;
Discuss the sanctions which have been put into place and are imposed when offenders are apprehended.
Discuss corporate fraud, embezzlement, and insider trading. Give an example of each.
How involved should a private security guard be with the emergency services team of the business they work for? Be specific and provide examples.
What is cyberterrorism? Give a brief overview of this crime and provide examples.
Explain the difference between left and right-wing terrorists. What is special interest terrorism?
RUBRIC |
||||||
Excellent Quality 95-100%
|
Introduction
45-41 points The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned. |
Literature Support 91-84 points The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned. |
Methodology 58-53 points Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met. |
|||
Average Score 50-85% |
40-38 points More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided. |
83-76 points Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration. |
52-49 points Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met. |
|||
Poor Quality 0-45% |
37-1 points The background and/or significance are missing. No search history information is provided. |
75-1 points Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration. |
48-1 points There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met |
|||
You Can Also Place the Order at www.collegepaper.us/orders/ordernow or www.crucialessay.com/orders/ordernow
Big Data Increases Cyber Security Vulnerabilities in Intelligent Transportation |
Big Data Increases Cyber Security Vulnerabilities in Intelligent Transportation