Posted: February 12th, 2023
For this assignment: You will use ONE of you research articles from p. 13a to write your first objective summary.
Requirements:
Assignment # Graduate Research 2
Research and Critical Analysis
Your Name
Department ???,
KG604: Graduate Research & Critical Analysis
Dr. Tennyson
January 22, 2023
Issue/Problem 1: 5G Applications
1) People Involved: Individuals, organizations
The US was involved in the 5G race. President Trump explained that America had to win the 5G race by quickly launching the network. However, it was noted that 5G networks were more vulnerable to cyberattacks than other networks.
2) Link to Article: https://www.brookings.edu/research/why-5g-requires-new-approaches-to-cybersecurity/
3) My Research Question: What have researchers learned about impacts of 5G networks on cybersecurity of individuals and organizations?
5G complicates cyber vulnerability because it virtualizes in software high-level network functions. There is vulnerability caused by attaching many hackable smart devices to the network.
Issue/Problem 2: Internet of Things and data privacy
The rise of Internet of Things raised privacy concerns. IoT devices collected data about the daily activities and habits of individuals. These data included location data, health data, and consumption-rate data.
1) People Involved: Internet users
2) Link to Article: https://en.unesco.org/inclusivepolicylab/analytics/data-privacy-and-internet-things 3) My Research Question: What have researchers learned about the impact of Internet of Things on data privacy of internet users?
IoT devices can be used by entities to obtain access to people’s homes. Individuals might not be able to determine what will happen to their information.
RESEARCH PROBLEM PROPOSALS 1
HW: Research Problem Proposals with Research Questions
Nikunj Dasharathbhai Patel
Department of Computer Science, Monroe College, King Graduate School
KG604: Graduate Research & Critical Analysis
Professor Jonathan Kyei
1/24/2023
RESEARCH PROBLEM PROPOSALS 2
HW: Research Problem Proposals with Research Questions
Issue/Problem 1: Cybersecurity and privacy
1) People Involved: Internet users, members of the public
The Red Cross Data Breach happened in January 2022. The hackers attacked servers with
personal information of 500,000 people.
2) Link to Article: https://www.theguardian.com/world/2022/jan/20/hacking-attack-on-red-
cross-exposes-data-of-515000-vulnerable-people
3) My Research Question: What have researchers learned about impacts of cybersecurity
breaches on individuals?
Cybersecurity issues have led to loss of privacy among individuals. Personal information
has been used to blackmail individuals and steal from them.
Issue/Problem 2: Artificial intelligence
1) People Involved: Society, members of the public
2) Link to Article: https://www.washingtonpost.com/opinions/2022/06/26/problem-with-self-
driving-cars-many-dont-drive-themselves
3) My Research Question: What have researchers learned about self-driving cars on the society
and individuals?
RESEARCH PROBLEM PROPOSALS 3
Self-driving cars use the concept of artificial intelligence. These cars have helped
members of the public, but they have also caused accidents.
SOLUTION
Cybersecurity and privacy are two critical issues that are increasingly important in today’s world of digital technology. Cybersecurity refers to the protection of digital devices, networks, and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This includes protecting sensitive information and preventing cyber attacks, such as hacking, malware, and phishing.
Privacy, on the other hand, refers to the right of individuals to control their personal information and how it is collected, used, and shared. This includes protecting sensitive information such as financial information, medical records, and other personal data from unauthorized access and misuse.
It is essential to take steps to ensure both cybersecurity and privacy, as failure to do so can have serious consequences, including financial losses, identity theft, and damage to reputation. This can be done by following best practices such as regularly updating software and systems, using strong passwords, enabling two-factor authentication, and being cautious of suspicious emails and links.
Place an order in 3 easy steps. Takes less than 5 mins.