Discussion Topic
In this week’s discussion, you will use the scientific method to address a specific problem. Follow the steps below to complete your initial discussion submission.
Keep in mind that many students may evaluate the same scenario/problem based on the program, but your responses should vary.
Look below for your program of study
Read the scenario/problem provided
Identify the research problem
Propose a hypothesis (educated guess) to solve the problem
Explain how your research methodology will allow you to test your hypothesis by detailing the experimental design aspect of your study. Ex: What are the independent and dependent variables within your study? How will your data allow you to prove your hypothesis?
Explain how you would collect the data
Finally, describe any conclusions you would draw or what further solutions may need to be explored
(Remember this is a Discussion Don’t need to be long just answer the above questions)
Computer Information Systems Transcript
Computer Information Systems Transcript: A major issue facing information technology companies is that the user is the weakest link in protecting companies from data breaches. Hackers use phishing techniques to get usernames, passwords, credit card numbers, and other personal indefinable information to gain access to user and company devices and networks. How can we design a research study that proves an effective solution to the vulnerability of users towards these tactics?
Do You Know That our Professional Writers are on Stand-by to Provide you with the Most Authentic Custom Paper. Order with us Today and Enjoy an Irresistible Discount!
