Research project (Report) Information Security



In this assessment, you are required to provide a complete report of your research project, that you chose in Assessment 3 (Research Project Abstract) by discussing the following aspects:

  • Overview of the technology involved
  • Relevant technologies and applications of those technologies
  • Highlighting the challenges/problems in your chosen research area
  • Identification of any gaps in the literature by:
    • discussing areas/issues that you believe have been addressed in the current literature;
    • highlighting areas/issues that have not been addressed or adequately addressed; and
    • discussing your view(s) on the issue(s) that you see as being critical.
  • Summarize the future research directions based on the identified gaps

To accomplish the above, you are expected to read and critically evaluate recent research in your selected research area by citing a minimum of 5 research articles. Students are encouraged to access such research articles from well known and reputed research portals such as IEEE, ACM, Springer, Wiley etc. Please note Wikipedia and general blogs will not be considered as reputable citations. 

The final submission must be in MS Word format using the given template that is available from the subject site under Assessment 5 folder in the Resources section.

Care must be taken to avoid direct quotes from sources. No marks will be awarded for any answer containing more than 10% direct quotes (referenced or unreferenced).

APA reference style must be used throughout the document with the bibliography at the end of the document. In-text citations should also follow APA style. APA referencing guide can be accessed via the following link. This also forms a part of the marking rubric.


Please note: Assessment MUST be submitted as ONE MS Word file via turnitin. Please do not submit *.zip or *.rar or multiple files. Assessments are marked and feedback is attached using a MS Word based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances will not be made for any loss of information, diagrams or images as a result of the re-formatting.

All assessment submission are subject to University regulations for academic misconduct (including plagiarism). As such, any text adapted from any source must be clearly labelled and referenced.

Do you need high quality Custom Essay Writing Services?

Order now
Reviews 0


There are no reviews yet.

Be the first to review “Research project (Report) Information Security”

Your email address will not be published. Required fields are marked *