Reflection on Discussions
VerifiedAdded on 2019/09/30
|4
|2178
|140
Report
AI Summary
The assignment requires students to summarize the issues discussed in a forum with at least two peers, including their own contribution and major findings. Additionally, students must provide references using APA referencing system.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Task
In this assessment you are required to -
- Select a topic from the list given below and conduct research (based on literature, at least three
recent research papers) and prepare a summary report with brief supportive descriptions to post on
the forum/blog. In your posting you should provide information about the topic (discuss the topic,
associated challenges & problems, describe the relevant technologies, applications of the
technologies, clarify vague areas, research questions etc.)
- Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at
least two) cohort colleagues on your own report and make refinements accordingly.
- Raise questions about the information provided by other students (this must be done in an
adequately professional manner)
- Respond to questions raised about your own information and that of other students
- Contribute to discussions in general
Note that the aim of this task is:
1. to build an understanding and perspective of current hot topics in Information Security; and
2. to build generic skills including, but not limited to:
- a capacity for teamwork and collaboration;
- an ability for critical thinking, analysis and problem solving;
- information technology literacy;
- a capacity for lifelong learning and an appreciation of its necessity.
As such, the more you contribute to the development of these topics and related discussion the more
likely you will score well in this task.
Topics Set
1. Digital signatures for secure e-commerce.
2. Biometrics for authentication: past. present and future.
3. Attacks against browsers and the potential countermeasures.
4. Recent trends in malware.
5. Signature-based intrusion detection systems.
6. Security and privacy issues of VoIP and Skype.
7. Privacy and security issues associated with Big Data.
8. Smart device security.
9. Internet of Things (IOT): Security issues and solutions.
10. Threats to wireless networks and countermeasures.
11. Bring Your Own Device (BYOD) security.
12. Security and privacy issues in cloud computing.
Your submission:
You are required to prepare and submit a report on your topic to address the following issues (Length
of the report: 1500~2000 words, excluding references):
a. Provide your published (to the forum/blog) research report on the chosen topic with brief supportive
descriptions about the challenges, problems, relevant technologies, applications of the technologies,
clarification on vague areas and research questions.
b. Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts
contributed to this knowledge and discuss whether or not the summary presented by your peers is
accurate.
c. Identify any important issue/s that you believe were not addressed, or not addressed adequately in
the discussions. Discuss why you view this issue/these issues as important.
d. Discuss the impact of the above mentioned issues and their application/impact in the real world.
e. Reflect on what you believe to be the most important lesson you have learnt as a result of these
discussions.
f. Provide references (at least three) using APA referencing system including in text citations.
In this assessment you are required to -
- Select a topic from the list given below and conduct research (based on literature, at least three
recent research papers) and prepare a summary report with brief supportive descriptions to post on
the forum/blog. In your posting you should provide information about the topic (discuss the topic,
associated challenges & problems, describe the relevant technologies, applications of the
technologies, clarify vague areas, research questions etc.)
- Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at
least two) cohort colleagues on your own report and make refinements accordingly.
- Raise questions about the information provided by other students (this must be done in an
adequately professional manner)
- Respond to questions raised about your own information and that of other students
- Contribute to discussions in general
Note that the aim of this task is:
1. to build an understanding and perspective of current hot topics in Information Security; and
2. to build generic skills including, but not limited to:
- a capacity for teamwork and collaboration;
- an ability for critical thinking, analysis and problem solving;
- information technology literacy;
- a capacity for lifelong learning and an appreciation of its necessity.
As such, the more you contribute to the development of these topics and related discussion the more
likely you will score well in this task.
Topics Set
1. Digital signatures for secure e-commerce.
2. Biometrics for authentication: past. present and future.
3. Attacks against browsers and the potential countermeasures.
4. Recent trends in malware.
5. Signature-based intrusion detection systems.
6. Security and privacy issues of VoIP and Skype.
7. Privacy and security issues associated with Big Data.
8. Smart device security.
9. Internet of Things (IOT): Security issues and solutions.
10. Threats to wireless networks and countermeasures.
11. Bring Your Own Device (BYOD) security.
12. Security and privacy issues in cloud computing.
Your submission:
You are required to prepare and submit a report on your topic to address the following issues (Length
of the report: 1500~2000 words, excluding references):
a. Provide your published (to the forum/blog) research report on the chosen topic with brief supportive
descriptions about the challenges, problems, relevant technologies, applications of the technologies,
clarification on vague areas and research questions.
b. Summarize the issues discussed in the forum (at least two peers). Discuss how your own posts
contributed to this knowledge and discuss whether or not the summary presented by your peers is
accurate.
c. Identify any important issue/s that you believe were not addressed, or not addressed adequately in
the discussions. Discuss why you view this issue/these issues as important.
d. Discuss the impact of the above mentioned issues and their application/impact in the real world.
e. Reflect on what you believe to be the most important lesson you have learnt as a result of these
discussions.
f. Provide references (at least three) using APA referencing system including in text citations.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Rationale
Depending on the topic selected, this assessment item relates to a number of key learning outcomes
of your subject.
Its also provides an opportunity for you to :
- demonstrate factual knowledge, understanding and application of state-of-art information security;
- demonstrates an understanding of what constitutes authoritative and valid evidence
- demonstrate ability to identify, locate, critique, integrate and apply information from various topics
and ;
- apply valid and applicable knowledge and understanding to a practical situation;
- analyse current data to construct and communicate new knowledge
- demonstrate ability to work in a team, sharing knowledge.
Marking criteria
Assessment criteria
Assessable
Components
HD
100% - 85%
DI
84% - 75%
CR
74% - 65%
PS
64% - 50%
FL
49% - 0
Provide your
published (to the
forum/blog)
research report on
the chosen topic
with brief
supportive
descriptions about
the challenges,
problems, relevant
technologies,
applications of the
technologies,
clarification on
vague areas and
research questions.
(10)
Demonstrate an
ability to survey
the literature,
concise summary
which are
logically
structured,
integrate and link
information into
cohesive and
coherent piece of
analysis and
consistently use
correct to the
selected topic
terminologies and
sophisticated
language.
Demonstrate an
ability to survey
the literature,
concise summary
which are
logically
structured to
create cohesive
and coherent
piece of analysis
that consistently
use correct
forensic
terminologies.
Demonstrate an
ability to survey the
literature, concise
summary which are
generally logically
structured to create
a comprehensive,
mainly descriptive
piece of analysis.
Some use of correct
forensic
terminologies.
Demonstrate an
ability to survey
the literature,
concise
summary which
partially
structured into
loosely-linked
rudimentary
sentences to
create a
comprehensive,
descriptive piece
of analysis.
Some use of
correct forensic
terminologies.
Fails to
demonstrate
the ability to
survey the
literature,
concise
summary
which
partially
structured and
may tend to
list
information.
Uses frequent
informal
language.
Possible Marks 10.0 – 8.5 8.4 – 7.5 7.4 – 6.4 6.4 – 5 4.9 – 0
Summarize the
issues discussed in
the forum (at least
two peers). Discuss
how your own posts
contributed to this
knowledge and
discuss whether or
not the summary
presented by your
peers is accurate.
(10)
The DI criteria,
plus:
Summary of the
literature (the
forum posting
above) also
exhibits
significant
creativity and
innovation in the
way it depicts
and presents the
design concept
and supportive
information.
Feedback
provided to two
cohort colleagues
offers in-depth
insights and relies
strongly prompts
on broader
examination of
Summary of the
literature (the
forum posting
above) is
strongly student-
centred or
reader-
orientated,
strikes a balance
between being
simple,
informative and
engaging and is
supported by
brief
descriptions,
how it fits within
the subject.
Feedback
provided to two
cohort colleagues
is informed,
constructive and
Summary of the
literature (the forum
posting above)
strikes a balance
between being
simple, informative
and engaging and is
supported by brief
descriptions, how it
fits within the topic.
Feedback provided
to two cohort
colleagues is
informed,
constructive and
progressive and
feedback received
is critically
reviewed with
changes made
supported through
reliance on
Information
Summary of the
literature (the
forum posting
above) is
supported by
brief
descriptions,
how it fits
within the topic.
Feedback
provided to two
cohort
colleagues is
informed and
constructive and
feedback
received is
reviewed with
changes made to
your report
accordingly.
Fails to
summarise
the literature
(the forum
posting
above) and
feedback
provided to
cohort
colleagues is
inadequate/or
lacking
research.
Uses frequent
informal
language.
Depending on the topic selected, this assessment item relates to a number of key learning outcomes
of your subject.
Its also provides an opportunity for you to :
- demonstrate factual knowledge, understanding and application of state-of-art information security;
- demonstrates an understanding of what constitutes authoritative and valid evidence
- demonstrate ability to identify, locate, critique, integrate and apply information from various topics
and ;
- apply valid and applicable knowledge and understanding to a practical situation;
- analyse current data to construct and communicate new knowledge
- demonstrate ability to work in a team, sharing knowledge.
Marking criteria
Assessment criteria
Assessable
Components
HD
100% - 85%
DI
84% - 75%
CR
74% - 65%
PS
64% - 50%
FL
49% - 0
Provide your
published (to the
forum/blog)
research report on
the chosen topic
with brief
supportive
descriptions about
the challenges,
problems, relevant
technologies,
applications of the
technologies,
clarification on
vague areas and
research questions.
(10)
Demonstrate an
ability to survey
the literature,
concise summary
which are
logically
structured,
integrate and link
information into
cohesive and
coherent piece of
analysis and
consistently use
correct to the
selected topic
terminologies and
sophisticated
language.
Demonstrate an
ability to survey
the literature,
concise summary
which are
logically
structured to
create cohesive
and coherent
piece of analysis
that consistently
use correct
forensic
terminologies.
Demonstrate an
ability to survey the
literature, concise
summary which are
generally logically
structured to create
a comprehensive,
mainly descriptive
piece of analysis.
Some use of correct
forensic
terminologies.
Demonstrate an
ability to survey
the literature,
concise
summary which
partially
structured into
loosely-linked
rudimentary
sentences to
create a
comprehensive,
descriptive piece
of analysis.
Some use of
correct forensic
terminologies.
Fails to
demonstrate
the ability to
survey the
literature,
concise
summary
which
partially
structured and
may tend to
list
information.
Uses frequent
informal
language.
Possible Marks 10.0 – 8.5 8.4 – 7.5 7.4 – 6.4 6.4 – 5 4.9 – 0
Summarize the
issues discussed in
the forum (at least
two peers). Discuss
how your own posts
contributed to this
knowledge and
discuss whether or
not the summary
presented by your
peers is accurate.
(10)
The DI criteria,
plus:
Summary of the
literature (the
forum posting
above) also
exhibits
significant
creativity and
innovation in the
way it depicts
and presents the
design concept
and supportive
information.
Feedback
provided to two
cohort colleagues
offers in-depth
insights and relies
strongly prompts
on broader
examination of
Summary of the
literature (the
forum posting
above) is
strongly student-
centred or
reader-
orientated,
strikes a balance
between being
simple,
informative and
engaging and is
supported by
brief
descriptions,
how it fits within
the subject.
Feedback
provided to two
cohort colleagues
is informed,
constructive and
Summary of the
literature (the forum
posting above)
strikes a balance
between being
simple, informative
and engaging and is
supported by brief
descriptions, how it
fits within the topic.
Feedback provided
to two cohort
colleagues is
informed,
constructive and
progressive and
feedback received
is critically
reviewed with
changes made
supported through
reliance on
Information
Summary of the
literature (the
forum posting
above) is
supported by
brief
descriptions,
how it fits
within the topic.
Feedback
provided to two
cohort
colleagues is
informed and
constructive and
feedback
received is
reviewed with
changes made to
your report
accordingly.
Fails to
summarise
the literature
(the forum
posting
above) and
feedback
provided to
cohort
colleagues is
inadequate/or
lacking
research.
Uses frequent
informal
language.
emerging trend of
Information
security.
progressive and
feedback
received is
critically
reviewed and
prompts a
broader
examination of
the issues raised
through reliance
on information
security.
security.
Possible Marks 10.0 – 8.5 8.4 – 7.5 7.4 – 6.4 6.4 – 5 4.9 – 0
Identify any
important issue/s
that you believe
were not addressed,
or not addressed
adequately in the
discussions. Discuss
why you view this
issue/these issues as
important. (8)
Comprehensive
knowledge of the
topic and in depth
explanation of the
issues that were
not addressed;
Reasonable
knowledge of the
topic and a
comprehensive
explanation of
the issues that
were not
addressed;
Provided
factual/conceptual
knowledge of the
topic and an overall
explanation of the
issues that were not
addressed;
Limited
knowledge of
the of the topic
and a basic
explanation of
the issues that
were not
addressed;
Fails to
satisfy
minimum
requirements
of explaining
the issues.
Possible Marks 8.0 – 6.8 6.7 – 6.0 5.9 – 5.2 5.1 – 4.0 3.9 – 0
Discuss the impact
of the above
mentioned issues
and their
application/impact
in the real world.
(8)
Comprehensive
knowledge of the
issues and real
life consequences
to a firm.
Reasonable
knowledge of the
issues and real
life
consequences to
a firm.
Provided
factual/conceptual
knowledge of the
issues and real life
consequences to a
firm.
Limited
knowledge of
the issues and
real life
consequences to
a firm.
Fails to
satisfy
minimum
requirements
of explaining
the impact on
a firm.
Possible Marks 8.0 – 6.8 6.7 – 6.0 5.9 – 5.2 5.1 – 4.0 3.9 – 0
Reflect on what you
believe to be the
most important
lesson you have
learnt as a result of
these discussions.
(8)
The reflection is
an in-depth
analysis of the
learning
experience, the
value of the
derived learning
to self and the
enhancement of
the student’s
appreciation for
the issues
surrounding the
topic.
The reflection is
a reasonable
analysis of the
learning
experience, the
value of the
derived learning
to self and the
enhancement of
the student’s
appreciation for
the issues
surrounding the
topic.
The reflection is a
reasonable analysis
of the learning
experience, the
some value of the
derived learning to
self.
The reflection
attempts a basic
analysis of the
learning
experience, but
the value of the
derived learning
to self is vague.
Fails to
satisfy
minimum
requirements
of reflecting
the important
lessons.
Possible Marks 8.0 – 6.8 6.7 – 6.0 5.9 – 5.2 5.1 – 4.0 3.9 – 0
Provide references
(at least three) using
APA referencing
system including in
text citations. (6)
Faultless
referencing,
including
reference list and
in text citations.
High quality
references.
Very good
referencing,
including
reference list and
in text citations.
High quality
references.
Good referencing,
including
reference list and
in text citations.
Good quality
references.
Evidence of
rudimentary
referencing
skills.
Mix of good and
poor quality
references.
Sub-standard
referencing.
Poor quality
references.
Possible Marks 6.0 – 5.1 5.04 – 4.5 4.44 – 3.85 3.84 – 3.0 2.9 – 0
Presentation
While there is no prescribed format for this report, the following should be included in the report:
• Executive Summary or Abstract (Provide a brief overview, your involvement/contribution, major
findings and conclusion)
Information
security.
progressive and
feedback
received is
critically
reviewed and
prompts a
broader
examination of
the issues raised
through reliance
on information
security.
security.
Possible Marks 10.0 – 8.5 8.4 – 7.5 7.4 – 6.4 6.4 – 5 4.9 – 0
Identify any
important issue/s
that you believe
were not addressed,
or not addressed
adequately in the
discussions. Discuss
why you view this
issue/these issues as
important. (8)
Comprehensive
knowledge of the
topic and in depth
explanation of the
issues that were
not addressed;
Reasonable
knowledge of the
topic and a
comprehensive
explanation of
the issues that
were not
addressed;
Provided
factual/conceptual
knowledge of the
topic and an overall
explanation of the
issues that were not
addressed;
Limited
knowledge of
the of the topic
and a basic
explanation of
the issues that
were not
addressed;
Fails to
satisfy
minimum
requirements
of explaining
the issues.
Possible Marks 8.0 – 6.8 6.7 – 6.0 5.9 – 5.2 5.1 – 4.0 3.9 – 0
Discuss the impact
of the above
mentioned issues
and their
application/impact
in the real world.
(8)
Comprehensive
knowledge of the
issues and real
life consequences
to a firm.
Reasonable
knowledge of the
issues and real
life
consequences to
a firm.
Provided
factual/conceptual
knowledge of the
issues and real life
consequences to a
firm.
Limited
knowledge of
the issues and
real life
consequences to
a firm.
Fails to
satisfy
minimum
requirements
of explaining
the impact on
a firm.
Possible Marks 8.0 – 6.8 6.7 – 6.0 5.9 – 5.2 5.1 – 4.0 3.9 – 0
Reflect on what you
believe to be the
most important
lesson you have
learnt as a result of
these discussions.
(8)
The reflection is
an in-depth
analysis of the
learning
experience, the
value of the
derived learning
to self and the
enhancement of
the student’s
appreciation for
the issues
surrounding the
topic.
The reflection is
a reasonable
analysis of the
learning
experience, the
value of the
derived learning
to self and the
enhancement of
the student’s
appreciation for
the issues
surrounding the
topic.
The reflection is a
reasonable analysis
of the learning
experience, the
some value of the
derived learning to
self.
The reflection
attempts a basic
analysis of the
learning
experience, but
the value of the
derived learning
to self is vague.
Fails to
satisfy
minimum
requirements
of reflecting
the important
lessons.
Possible Marks 8.0 – 6.8 6.7 – 6.0 5.9 – 5.2 5.1 – 4.0 3.9 – 0
Provide references
(at least three) using
APA referencing
system including in
text citations. (6)
Faultless
referencing,
including
reference list and
in text citations.
High quality
references.
Very good
referencing,
including
reference list and
in text citations.
High quality
references.
Good referencing,
including
reference list and
in text citations.
Good quality
references.
Evidence of
rudimentary
referencing
skills.
Mix of good and
poor quality
references.
Sub-standard
referencing.
Poor quality
references.
Possible Marks 6.0 – 5.1 5.04 – 4.5 4.44 – 3.85 3.84 – 3.0 2.9 – 0
Presentation
While there is no prescribed format for this report, the following should be included in the report:
• Executive Summary or Abstract (Provide a brief overview, your involvement/contribution, major
findings and conclusion)
• Table of Content
• Introduction
• Copy of your published (to the forum/blog) research report (see marking criteria for details)
• Summary of discussion in the forum (see marking criteria for details)
• Any important issue/s that you believe were not addressed, or not addressed adequately in the
discussions. (see marking criteria for details)
• Impact of the above mentioned issues and their application/impact in the real world.
• Reflection on what you believe to be the most important lesson you have learnt as a result of these
discussions.
• Conclusion
• References (You must cite references to all material that you have used as sources for the content
of your work. Follow the referencing guidelines for APA 6 as specified in Referencing Guides.)
• Glossary (Preferable)
A glossary should assist the reader in understanding any technical terms used in the report. Use a
generally accepted source for the definition of the terms and include appropriate references.
• Appendices (Preferable)
You can attach any supporting material such as printouts of particular items of evidence, feedback
from your cohort colleagues etc.
Submit the assignment in ONE word or pdf file via EASTS. Please do not submit *.zip or *.rar or
multiple files.
Requirements
Your submission must be in a form readable by Microsoft Word format.
• A cover page (outside the page limit) must be included and should contain relevant identifying
information (Name, Student ID#, Subject Code, Session, Assessment No.)
• Your discussion postings are considered part of your assignment submission and are thus subject to
Faculty regulations for academic misconduct (including plagiarism). As such, any text adapted from
any source must be clearly labelled and referenced. You should clearly indicate the start and end of
any such text.
• Your discussion postings will be required to complete your assignment but do not directly form part
of the assessment of the assignment. As such, no formal feedback will be provided regarding your
discussions.
• Introduction
• Copy of your published (to the forum/blog) research report (see marking criteria for details)
• Summary of discussion in the forum (see marking criteria for details)
• Any important issue/s that you believe were not addressed, or not addressed adequately in the
discussions. (see marking criteria for details)
• Impact of the above mentioned issues and their application/impact in the real world.
• Reflection on what you believe to be the most important lesson you have learnt as a result of these
discussions.
• Conclusion
• References (You must cite references to all material that you have used as sources for the content
of your work. Follow the referencing guidelines for APA 6 as specified in Referencing Guides.)
• Glossary (Preferable)
A glossary should assist the reader in understanding any technical terms used in the report. Use a
generally accepted source for the definition of the terms and include appropriate references.
• Appendices (Preferable)
You can attach any supporting material such as printouts of particular items of evidence, feedback
from your cohort colleagues etc.
Submit the assignment in ONE word or pdf file via EASTS. Please do not submit *.zip or *.rar or
multiple files.
Requirements
Your submission must be in a form readable by Microsoft Word format.
• A cover page (outside the page limit) must be included and should contain relevant identifying
information (Name, Student ID#, Subject Code, Session, Assessment No.)
• Your discussion postings are considered part of your assignment submission and are thus subject to
Faculty regulations for academic misconduct (including plagiarism). As such, any text adapted from
any source must be clearly labelled and referenced. You should clearly indicate the start and end of
any such text.
• Your discussion postings will be required to complete your assignment but do not directly form part
of the assessment of the assignment. As such, no formal feedback will be provided regarding your
discussions.
1 out of 4
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.