question archive MURDOCH UNIVERSITY BSC203 INTRODUCTION TO ICT RESEARCH METHODS Literature Review Assignment A literature review is an account of what has been published on a topic (in journal articles, conference proceedings, books and other relevant sources) by recognised researchers

MURDOCH UNIVERSITY BSC203 INTRODUCTION TO ICT RESEARCH METHODS Literature Review Assignment A literature review is an account of what has been published on a topic (in journal articles, conference proceedings, books and other relevant sources) by recognised researchers

Subject:BusinessPrice:0 Bought3

MURDOCH UNIVERSITY

BSC203 INTRODUCTION TO ICT RESEARCH METHODS

Literature Review Assignment

A literature review is an account of what has been published on a topic (in journal articles, conference proceedings, books and other relevant sources) by recognised researchers. Understanding the prior research on a particular topic is the basis of most new research. Researchers must know what has been studied, discussed and recommended by others in related areas.

 

This assignment is intended to:

  • Provide you with practise finding peer reviewed, recent articles about one topic
  • Allow you to organise your ideas about that topic in a meaningful way (including both synthesis and critical analysis).

 

In this assignment you will review the published literature on one of the following topics and write a literature review that synthesizes what you have found into a summary of what is, and is not, known on the topic. You should use the topic as a starting point and choose a focussed subset of the topic. For example, if you choose user security behaviour as your broad area, you could focus on a particular type of threat such as phishing, or you could focus on organisational security behaviour.

 

  • User security behaviour - Information technology security is an increasingly important research topic. Although organisations spend large amounts on technology that can help safeguard the security of their information and computing assets, increased attention is being focused on the role people play in maintaining a safe computing environment. This issue is important both for organisational and home computing.
  • Affective computing - Affective computing is “computing that relates to, arises from, or deliberately influences emotions”[1]. Developments in affective computing facilitate more intuitive, natural computer interfaces by enabling the communication of the user’s emotional state. Despite rapid growth in recent years, affective computing is still an under-explored field, which holds promise to be a valuable direction for future software development. 

 

  • Interactive game playing and network quality - Understanding the impact of network conditions on online game player satisfaction has been a major concern of network game designers and network engineers, and has received research attention from both angles. For example, a number of studies have sought to evaluate the effect of aspects of network quality, such as network delay and network loss, on online gamers’ satisfaction and behaviour.
  • The effectiveness of e-learning - Education is increasingly supported by ICT, with the term e-learning being used as a general term to refer to many forms of technology supported learning. Much of the e-learning research has had a technology focus (e.g. descriptions of implementations) or has been limited to studies of adoption (i.e. will people use it?), but there has been less research on the impact of e-learning on outcomes for students.
  • Mobile analytics– The term ‘big data’ refers to data sets that are large and complex and hence require new approaches to deal with them. Data analytics has become increasingly important to business and much research has been undertaken into how big data can be used to help organisations make decisions. Mobile analytics is a growing area of focus for data scientists.
  • Internet of Things (IoT) privacy and security issuesThe IoT allows devices with unique addressing schemes to share data with one another and has applications in a wide range of areas including transport, healthcare, manufacturing and home automation. Many of these devices are used for consumer applications (e.g., domestic appliances, smartphones, and fitness devices), and despite the proposed benefits, privacy and security issues have been raised as they collect information constantly.

 

 

To do

To successfully complete the assignment, you must begin searching for relevant literature immediately. The skills you obtained in your Transition or Foundation unit and have practised in tutorials for BSC203 will be invaluable.

 

Find at least 10 articles related to your chosen topic. To qualify as a source of information that you can use for the assignment, these main articles must report results of research studies (i.e. not just authors’ opinions). Each article must also:

  • Have been published in a refereed journal or conference proceedings (though you may obtain the article through an online source)
  • Have an extensive references section.

In addition you may choose to supplement these articles with a few articles from other sources or that do not present the authors’ own results.

 

After reading each article, you should think about how they all fit together. Your review should be organised by concepts, such as findings, rather than by sources of information. Do not proceed through the articles one-by-one. Your literature review should include an introduction, a main body that reviews the literature (and which you should subdivide further), and a conclusion. The Topic 3 lecture slides and Chapter 6 of the textbook will be useful to you in writing the literature review. You might also find the following resource from RMIT useful: https://www.dlsweb.rmit.edu.au/lsu/content/2_assessmenttasks/assess_pdf/PG%20lit%20review.pdf

 

NOTE: Plagiarism is not acceptable. Urkund will be used to report on potential plagiarism.  Find out more about how to reference properly and avoid plagiarism at
http://our.murdoch.edu.au/Student-life/Study-successfully/Referencing-and-citing/

 

 

 

 

 

 

 

Format guidelines  

  • Give your literature review a title that clearly reflects the content of your review.
  • Include an Introduction section that states the purpose of the review and a Conclusion section.  Include other sub-sections to help structure your work.
  • Use a professional looking font and a font size of 11 or 12 point.
  • Your review should be approximately 1500 words in length.
  • Include appropriate citations throughout the review and a list of references at the end.  Referencing should be in either APA or IEEE style (see http://library.murdoch.edu.au/Students/Referencing/ for information on referencing styles)
  • Your review should include a minimum of 10 sources of information.

 

 

 

MARKING SCHEDULE

 

Component

Marks

Structure

  • Does the introduction describe the purpose of the literature review?
  • Does the body present information in an organised and logical manner?
  • Is there an effective conclusion that summarises the main points discussed?

 

10

 

Content and Research:

  • Does the title reflect the contents of the literature review?
  • Is there evidence of adequate understanding of the literature included?
  • Is the organisation/grouping of the literature effective with the main points clearly related to the purpose of the review?
  • Are the main points supported by evidence (are not just your opinions)?
  • Is the material well synthesised?

 

60

 

Use of Sources

  • Are at least 10 references cited?
  • Are mainly academic sources (e.g. journal articles and conference papers) used?
  • Is it correctly referenced in APA or IEEE style (‘in-text’ referencing and reference list)?
  • Is it in your own words?

 

20

 

Presentation

  • Fluent (correct grammar, spell-checked and correctly punctuated)?
  • Correctly structured (paragraphing, topic sentences and flow of ideas)?
  • Have section headings been used to help structure the main text?

 

10

 

TOTAL

100

 

       
 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE