What methodology will you be following to realise your


My project is two assessments (interim report) I Have Project - Information Management & Security " A Study in Security Consideration when adopting BYOD in Sultanate of Oman SMEs".

This study will show overview of adopting BYOD in Oman and evaluate the challenges and security risk they faced to understand how they integrate BYOD in to their business. this thesis also will provide a guide in Security consideration when adopting BYOD in to SMEs showing what are the risks and opportunities, security policies, current state of adopting BYOD in SMEs and what are the solutions can be provided to assist IT professionals in SMEs.

Assessment 1a Project Proposal + Ethics Form You must attach these (signed) as part of the Interim Report (maximum word 3500).

######Attached old report as example ##### Assessment 1b Submit Interim Report (Including market Surveys + Design Blueprints)

Submit interim report (including market surveys & design blueprints).

Second assessment is full porject thesis maximum word 15000.

Project Proposal Form and Ethics Form

Description of your artefact Context of project with reference to relevant existing products, services and work (ie how does your artefact relate to what other people have done)

Aim & objectives of the project

List of features that the artefact will include

Identify added value that the project provides

Identify the intellectual challenges involved

What methodology (structured process) will you be following to realise your artefact? Describe approach that will be employed to develop your project artefact (this should also show how you plan to test and evaluate the work)

Justify the appropriateness and suitability of your approach for realising your artefact

How does your project relate to your degree course and build upon the units/knowledge you have studied/acquired Highlight aspects of the project that correlate with knowledge and skills acquired from your course of study

Resources List ALL the resources required to develop your artefact
Be clear on which packages, tools, languages and environments will be used and are available on campus

FACULTY OF CREATIVE ARTS, TECHNOLOGIES AND SCIENCE

Form for Research Ethics Projects (CATSethicsform)

SECTION A Ethical Issues

Please summarise below the ethical issues involved in the research proposal and how they will be addressed. In any proposal involving human participants clear explanation of how informed consent will be obtained, how confidentiality will be observed, how the nature of the research and the means of dissemination of the outcomes will be communicated to participants must be provided.

SECTION B Check List

Please answer the following questions by circling YES or NO as appropriate.

1. Does the study involve vulnerable participants or those unable to give informed consent (e.g. children, people with learning disabilities, your own students)?

YES NO

2. Will the study require permission of a gatekeeper for access to participants (e.g. schools, self-help groups, residential homes)?

YES NO

3. Will it be necessary for participants to be involved without consent (e.g. covert observation in non-public places)?

YES NO

4. Will the study involve sensitive topics (e.g. obtaining information about sexual activity, substance abuse)?

YES NO

5. Will blood, tissue samples or any other substances be taken from participants?

YES NO

6. Will the research involve intrusive interventions (e.g. the administration of drugs, hypnosis, physical exercise)?

YES NO

7. Will financial or other inducements be offered to participants (except reasonable expenses or small tokens of appreciation)?

YES NO

8. Will the research investigate any aspect of illegal activity (e.g. drugs, crime, underage alcohol consumption or sexual activity)?

YES NO

9. Will participants be stressed beyond what is considered normal for them?

YES NO

10. Will the study involve participants from the NHS (patients or staff) or will data be obtained from NHS premises?

YES NO

If the answer to any of the questions above is "Yes", or if there are any other significant ethical issues, then further ethical consideration is required. Please document carefully how these issues will be addressed.

Attachment:- old REPORT_INTERIM.rar

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: What methodology will you be following to realise your
Reference No:- TGS01296426

Expected delivery within 24 Hours