Skip to Main Content

IT 840: Statistics, strategy of inquiry, & more

Strategy of Inquiry

Research resources examples by types of strategy of inquiry

Experiment:

Chen, X., Zhou, Y., Zhou, H., Wan, C., Zhu, Q., Li, W., & Hu, S. (2016). Analysis of production data manipulation attacks in petroleum cyber-physical systems. Paper presented at the Proceedings of the 35th International Conference on Computer-Aided Design, Austin, Texas. doi:10.1145/2966986.2980091 Retrieved from https://doi-org.proxymu.wrlc.org/10.1145/2966986.2980091

Haque, M. A., Shetty, S., & Kamdem, G. (2018). Improving bulk power system resilience by ranking critical nodes in the vulnerability graph. Paper presented at the Proceedings of the Annual Simulation Symposium, Baltimore, Maryland.

Survey:

Rodr ' iguez-G 'omez, Rafael A., Maci 'a-Fern 'andez, G., & Garc ' ia-Teodoro, P. (2013). Survey and taxonomy of botnet research through life-cycle. ACM Comput.Surv., 45(4) doi:10.1145/2501654.2501659

Herath, T. C., Herath, H. S. B., & D’Arcy, J. (2020). Organizational adoption of information security solutions: An integrative lens based on innovation adoption and the technology- organization- environment framework. SIGMIS Database, 51(2), 12–35. doi:10.1145/3400043.3400046

Case study:

Chatfield, A. T., & Reddick, C. G. (2017). Cybersecurity innovation in government: A case study of U.S. pentagon’s vulnerability reward program. Paper presented at the Proceedings of the 18th Annual International Conference on Digital Government Research, Staten Island, NY, USA. 64–73. doi:10.1145/3085228.3085233 Retrieved from https://doi-org.proxymu.wrlc.org/10.1145/3085228.3085233

Touhiduzzaman, M., Hahn, A., & Lotfifard, S. (2019). An distributed cyberattack diagnosis scheme for malicious protection operation based on IEC 61850. Paper presented at the Proceedings of the Fifth Annual Industrial Control System Security (ICSS) Workshop, San Juan, PR, USA. 21–29. doi:10.1145/3372318.3372326 Retrieved from https://doi-org.proxymu.wrlc.org/10.1145/3372318.3372326

Literature Review Discussion

Literature review has three objectives:

1.Allows you to justify the empirical, social and political relevance of your question by demonstrating the gap between existing studies and what we should know;

2.Allows you to situate your question within the debates in order to identify the theoretical relevance of your project;

3.Helps you to define the concepts of your research question, in relevance to  the theoretical framework chosen.

 

Contact MU Libraries
2807 North Glebe Road, Arlington, Virginia 22207
Login to LibApps