Discussion Topic

In this week’s discussion, you will use the scientific method to address a specific problem.  Follow the steps below to complete your initial discussion submission.

Keep in mind that many students may evaluate the same scenario/problem based on the program, but your responses should vary.

Look below for your program of study

Read the scenario/problem provided

Identify the research problem

Propose a hypothesis (educated guess) to solve the problem

Explain how your research methodology will allow you to test your hypothesis by detailing the experimental design aspect of your study. Ex: What are the independent and dependent variables within your study? How will your data allow you to prove your hypothesis?

Explain how you would collect the data

Finally, describe any conclusions you would draw or what further solutions may need to be explored

(Remember this is a Discussion Don’t need to be long just answer the above questions)

Computer Information Systems Transcript

Computer Information Systems Transcript: A major issue facing information technology companies is that the user is the weakest link in protecting companies from data breaches. Hackers use phishing techniques to get usernames, passwords, credit card numbers, and other personal indefinable information to gain access to user and company devices and networks. How can we design a research study that proves an effective solution to the vulnerability of users towards these tactics?

 

 

Do You Know That our Professional Writers are on Stand-by to Provide you with the Most Authentic Custom Paper. Order with us Today and Enjoy an Irresistible Discount!