For This or a Similar Paper Click Here To Order Now
Looking for a 4-5 page literature review
10-11 page final project
Possible edits after critique.
3.Addressing Phishing in the UMASS Higher Education System. All 30 colleges and universities in the Massachusetts higher education system have seen increases in successful phishing attempts. They put in place a new Critical Incident Response Team for the entire UMass system that wants to implement a certification training for all employees designed to teach people to recognize and report phishing attempts and incidents. The university wants to know if the training is effective since it will be expensive and challenging to implement in all of the colleges and universities across the entire system. The team has been given permission by the University to design a school based study to determine if the certification prevents successful phishing attempts. The Team has $250,000 and the cooperation of the UMASS cyber security office.
Research Proposal Assignment Details
The research proposal will be approximately 10-12 pages of well-written and well-organized text and will address the following aspects of a proposed research project:
1. Literature Review: Includes the research problem statement and summary of research on the subject–5 page limit.) (30%)
2. Describe the key concepts (IV and DV) involved and how they will be measured in the proposed research approach. (10%)
3. Design: explain the research design. Include proposed sampling design and data collection strategy (survey, interview, admin.data); discuss data collection concerns (type and quality, strengths and limitations) and the rationale for the proposed approach over other approaches; provide a draft example of data collection instrument–survey, questionnaire, coding instrument,etc. (35%)
4. Describe a proposed analytic plan (how are you going to examine the data to answer your questions – will you make group and time comparisons?) (10%)
5. Discuss the resource needs and implications of possible findings. (10%)
Resource needs include: how the research should be staffed, cost estimates to fit within the budget and the likely research timetable.
Remember that you will be submitting a draft of this proposal so you can get peer review from another student. I will also grade your proposal and tell you exactly what you need to improve before the final project is completed. Don’t worry, it will be fine as long as you meet the deadlines, basic requirements, and you get the core concepts
Here’s an outline to guide you in drafting the research proposal for addressing phishing in the UMASS Higher Education System. This includes details for each section of your assignment:
1. Literature Review (5-page limit)
- Research Problem Statement: Define the issue of increasing phishing attempts in the Massachusetts higher education system. Discuss its significance, previous instances of successful phishing attacks, and the potential impact of this on the educational institutions.
- Summary of Research on Phishing and Training Effectiveness: Summarize existing studies related to phishing awareness programs, their effectiveness, and how training might reduce phishing incidents. Focus on case studies from similar organizations or institutions that have implemented phishing training programs.
- Theoretical Framework: Include theories that underpin phishing susceptibility and awareness training, such as behavioral theories or the Protection Motivation Theory.
2. Key Concepts (IV and DV) (1-page)
- Independent Variable (IV): Certification training program for recognizing and reporting phishing attempts.
- Dependent Variable (DV): Reduction in successful phishing attempts across the UMASS system.
- Measurement:
- IV: Survey or questionnaire data to assess employee knowledge pre- and post-training.
- DV: Data from the university’s cybersecurity office, tracking successful phishing attempts before and after training.
3. Design (3-4 pages)
- Research Design:
- A quasi-experimental design with a pre-test/post-test model, comparing phishing rates before and after training across different campuses.
- Random sampling of employees across campuses to ensure representation.
- Data Collection Strategy:
- Use surveys and questionnaires to assess employee knowledge before and after the training program.
- Cybersecurity data (from the UMASS cybersecurity office) to track phishing incidents.
- Consider interviews with employees for qualitative insights.
- Strengths and Limitations:
- Strength: Access to cybersecurity data provides real-time information about phishing attempts.
- Limitation: Variability in how well employees retain training and apply it in real-world scenarios.
- Draft Data Collection Instrument: Create a sample survey with questions assessing phishing recognition skills before and after the training.
4. Analytic Plan (1 page)
- Data Analysis Approach:
- Conduct a paired t-test to compare the number of successful phishing attempts before and after the training.
- Analyze survey data for significant changes in phishing awareness.
- Use regression analysis to understand the relationship between training and phishing attempts, accounting for confounding variables like prior cybersecurity knowledge.
5. Resource Needs and Implications (1 page)
- Staffing:
- Research assistant for data collection and survey administration.
- Collaboration with UMASS IT and cybersecurity office for data access.
- Cost Estimates:
- Estimate costs for employee time, survey tools, analysis software, and any external consultants.
- Research Timetable:
- Training development and rollout (1 month).
- Data collection (3 months).
- Data analysis (2 months).
- Implications:
- If successful, the research may suggest the need for large-scale phishing training across the state or within other higher education institutions.
- Long-term benefits could include reduced cybersecurity incidents and a more informed workforce.
Feel free to follow this framework and adapt it to the specific requirements of your proposal. Let me know if you’d like help with any specific sections!
For This or a Similar Paper Click Here To Order Now
WRITE MY ESSAY