SlideShare a Scribd company logo
1 of 2
Research topic: What is the impact of Gamification on security
training?
Ph.D. in Information Technology is my program.
How is the research topic related to your major? (( Information
Technology is my major))
How is the research topic connected to program goals and core
courses ?? -- -- ((see attachment for core courses ))
Programs goals:
Contribute to organizational strategy and resiliency through IT
Define shifts in national and international IT policy
Leverage IT technologies to manage risk and enforce security
measures
Design highly scalable systems to process and analyze Big Data
Empower smart cities through data science
Manage data-driven decisions … identify cyber threats …
improve connectivity
https://www.ucumberlands.edu/academics/graduate/programs/ex
ecutive-doctorate-philosophy-information-technology

More Related Content

Similar to Research topic What is the impact of Gamification on security train.docx

Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data Naveed Ahmed
 
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitTakishaPeck109
 
Journal of Management Information Systems Summer 2014, Vol. .docx
Journal of Management Information Systems  Summer 2014, Vol. .docxJournal of Management Information Systems  Summer 2014, Vol. .docx
Journal of Management Information Systems Summer 2014, Vol. .docxcroysierkathey
 
CIS 499 – Information Systems Capstone © 2012 Strayer.docx
 CIS 499 – Information Systems Capstone   © 2012 Strayer.docx CIS 499 – Information Systems Capstone   © 2012 Strayer.docx
CIS 499 – Information Systems Capstone © 2012 Strayer.docxMARRY7
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxucisa
 
Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Joanne Luciano
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
Module 3
Module 3 Module 3
Module 3 EX28
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docxalinainglis
 
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Angel Rodriguez
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...Finni Rice
 
NSF Program Announcement in CompTIA News 2003
NSF Program Announcement in CompTIA News 2003NSF Program Announcement in CompTIA News 2003
NSF Program Announcement in CompTIA News 2003jmailen
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security ManagementMITSDEDistance
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE360 BSI
 
I need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pI need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pdoylymaura
 

Similar to Research topic What is the impact of Gamification on security train.docx (20)

Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data
 
PurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilitPurposeThis course project is intended to assess your abilit
PurposeThis course project is intended to assess your abilit
 
Journal of Management Information Systems Summer 2014, Vol. .docx
Journal of Management Information Systems  Summer 2014, Vol. .docxJournal of Management Information Systems  Summer 2014, Vol. .docx
Journal of Management Information Systems Summer 2014, Vol. .docx
 
CIS 499 – Information Systems Capstone © 2012 Strayer.docx
 CIS 499 – Information Systems Capstone   © 2012 Strayer.docx CIS 499 – Information Systems Capstone   © 2012 Strayer.docx
CIS 499 – Information Systems Capstone © 2012 Strayer.docx
 
mits brochure
mits brochuremits brochure
mits brochure
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Module 3
Module 3 Module 3
Module 3
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
Current_Cybersecurity_Trends_AD_Rodriguez_UCSP615_09252015(Final)
 
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
A Critical Analysis Of Information Security -A Case Study Of Cognizant Techno...
 
NSF Program Announcement in CompTIA News 2003
NSF Program Announcement in CompTIA News 2003NSF Program Announcement in CompTIA News 2003
NSF Program Announcement in CompTIA News 2003
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security Management
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
 
I need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course pI need 10 pages of report and 10 slides PurposeThis course p
I need 10 pages of report and 10 slides PurposeThis course p
 

More from brittneyj3

Research TopicCorporations are making the assumption that ever.docx
Research TopicCorporations are making the assumption that ever.docxResearch TopicCorporations are making the assumption that ever.docx
Research TopicCorporations are making the assumption that ever.docxbrittneyj3
 
Research two (2) manufacturing or two (2) service companies that m.docx
Research two (2) manufacturing or two (2) service companies that m.docxResearch two (2) manufacturing or two (2) service companies that m.docx
Research two (2) manufacturing or two (2) service companies that m.docxbrittneyj3
 
Research Topic  Stratgic planning in Information Technology.docx
Research Topic  Stratgic planning in Information Technology.docxResearch Topic  Stratgic planning in Information Technology.docx
Research Topic  Stratgic planning in Information Technology.docxbrittneyj3
 
RESEARCH TOPIC; SOCIAL WORKERS AND IDENTIFICATION OF HUMAN TRAFF.docx
RESEARCH TOPIC; SOCIAL WORKERS AND IDENTIFICATION OF HUMAN TRAFF.docxRESEARCH TOPIC; SOCIAL WORKERS AND IDENTIFICATION OF HUMAN TRAFF.docx
RESEARCH TOPIC; SOCIAL WORKERS AND IDENTIFICATION OF HUMAN TRAFF.docxbrittneyj3
 
Research Title VII of the Civil Rights Act of 1964 and discuss why i.docx
Research Title VII of the Civil Rights Act of 1964 and discuss why i.docxResearch Title VII of the Civil Rights Act of 1964 and discuss why i.docx
Research Title VII of the Civil Rights Act of 1964 and discuss why i.docxbrittneyj3
 
Research topic StakeholderInstructionsYour submission .docx
Research topic StakeholderInstructionsYour submission .docxResearch topic StakeholderInstructionsYour submission .docx
Research topic StakeholderInstructionsYour submission .docxbrittneyj3
 
Research Theory, Design, and Methods Walden University © .docx
Research Theory, Design, and Methods  Walden University © .docxResearch Theory, Design, and Methods  Walden University © .docx
Research Theory, Design, and Methods Walden University © .docxbrittneyj3
 
Research the secondary transition services for students with disabil.docx
Research the secondary transition services for students with disabil.docxResearch the secondary transition services for students with disabil.docx
Research the secondary transition services for students with disabil.docxbrittneyj3
 
Research the use of social stories for teaching socially appro.docx
Research the use of social stories for teaching socially appro.docxResearch the use of social stories for teaching socially appro.docx
Research the use of social stories for teaching socially appro.docxbrittneyj3
 
Research the variety of enumeration tools available. Select one tool.docx
Research the variety of enumeration tools available. Select one tool.docxResearch the variety of enumeration tools available. Select one tool.docx
Research the variety of enumeration tools available. Select one tool.docxbrittneyj3
 
Research Topic and Methodology Form—Unit 4Use the research s.docx
Research Topic and Methodology Form—Unit 4Use the research s.docxResearch Topic and Methodology Form—Unit 4Use the research s.docx
Research Topic and Methodology Form—Unit 4Use the research s.docxbrittneyj3
 
Research TitleStudent NameCourse Number – TermYearProfess.docx
Research TitleStudent NameCourse Number – TermYearProfess.docxResearch TitleStudent NameCourse Number – TermYearProfess.docx
Research TitleStudent NameCourse Number – TermYearProfess.docxbrittneyj3
 
Research these topics topics for a two to three page paper. Write th.docx
Research these topics topics for a two to three page paper. Write th.docxResearch these topics topics for a two to three page paper. Write th.docx
Research these topics topics for a two to three page paper. Write th.docxbrittneyj3
 
Research the web to identify a SystemsSoftware Development Lifecycl.docx
Research the web to identify a SystemsSoftware Development Lifecycl.docxResearch the web to identify a SystemsSoftware Development Lifecycl.docx
Research the web to identify a SystemsSoftware Development Lifecycl.docxbrittneyj3
 
Research the specific domains and components of the COBIT Framework..docx
Research the specific domains and components of the COBIT Framework..docxResearch the specific domains and components of the COBIT Framework..docx
Research the specific domains and components of the COBIT Framework..docxbrittneyj3
 
Residency5COVER PAGETable of Conte.docx
Residency5COVER PAGETable of Conte.docxResidency5COVER PAGETable of Conte.docx
Residency5COVER PAGETable of Conte.docxbrittneyj3
 
Research the role that Milton plays in Romantic writing and trac.docx
Research the role that Milton plays in Romantic writing and trac.docxResearch the role that Milton plays in Romantic writing and trac.docx
Research the role that Milton plays in Romantic writing and trac.docxbrittneyj3
 
Research the two alternative presentation applications that yo.docx
Research the two alternative presentation applications that yo.docxResearch the two alternative presentation applications that yo.docx
Research the two alternative presentation applications that yo.docxbrittneyj3
 
Research project oversight using the University Library.Writ.docx
Research project oversight using the University Library.Writ.docxResearch project oversight using the University Library.Writ.docx
Research project oversight using the University Library.Writ.docxbrittneyj3
 
Research the responsibility of a critical thinker in a contemporary .docx
Research the responsibility of a critical thinker in a contemporary .docxResearch the responsibility of a critical thinker in a contemporary .docx
Research the responsibility of a critical thinker in a contemporary .docxbrittneyj3
 

More from brittneyj3 (20)

Research TopicCorporations are making the assumption that ever.docx
Research TopicCorporations are making the assumption that ever.docxResearch TopicCorporations are making the assumption that ever.docx
Research TopicCorporations are making the assumption that ever.docx
 
Research two (2) manufacturing or two (2) service companies that m.docx
Research two (2) manufacturing or two (2) service companies that m.docxResearch two (2) manufacturing or two (2) service companies that m.docx
Research two (2) manufacturing or two (2) service companies that m.docx
 
Research Topic  Stratgic planning in Information Technology.docx
Research Topic  Stratgic planning in Information Technology.docxResearch Topic  Stratgic planning in Information Technology.docx
Research Topic  Stratgic planning in Information Technology.docx
 
RESEARCH TOPIC; SOCIAL WORKERS AND IDENTIFICATION OF HUMAN TRAFF.docx
RESEARCH TOPIC; SOCIAL WORKERS AND IDENTIFICATION OF HUMAN TRAFF.docxRESEARCH TOPIC; SOCIAL WORKERS AND IDENTIFICATION OF HUMAN TRAFF.docx
RESEARCH TOPIC; SOCIAL WORKERS AND IDENTIFICATION OF HUMAN TRAFF.docx
 
Research Title VII of the Civil Rights Act of 1964 and discuss why i.docx
Research Title VII of the Civil Rights Act of 1964 and discuss why i.docxResearch Title VII of the Civil Rights Act of 1964 and discuss why i.docx
Research Title VII of the Civil Rights Act of 1964 and discuss why i.docx
 
Research topic StakeholderInstructionsYour submission .docx
Research topic StakeholderInstructionsYour submission .docxResearch topic StakeholderInstructionsYour submission .docx
Research topic StakeholderInstructionsYour submission .docx
 
Research Theory, Design, and Methods Walden University © .docx
Research Theory, Design, and Methods  Walden University © .docxResearch Theory, Design, and Methods  Walden University © .docx
Research Theory, Design, and Methods Walden University © .docx
 
Research the secondary transition services for students with disabil.docx
Research the secondary transition services for students with disabil.docxResearch the secondary transition services for students with disabil.docx
Research the secondary transition services for students with disabil.docx
 
Research the use of social stories for teaching socially appro.docx
Research the use of social stories for teaching socially appro.docxResearch the use of social stories for teaching socially appro.docx
Research the use of social stories for teaching socially appro.docx
 
Research the variety of enumeration tools available. Select one tool.docx
Research the variety of enumeration tools available. Select one tool.docxResearch the variety of enumeration tools available. Select one tool.docx
Research the variety of enumeration tools available. Select one tool.docx
 
Research Topic and Methodology Form—Unit 4Use the research s.docx
Research Topic and Methodology Form—Unit 4Use the research s.docxResearch Topic and Methodology Form—Unit 4Use the research s.docx
Research Topic and Methodology Form—Unit 4Use the research s.docx
 
Research TitleStudent NameCourse Number – TermYearProfess.docx
Research TitleStudent NameCourse Number – TermYearProfess.docxResearch TitleStudent NameCourse Number – TermYearProfess.docx
Research TitleStudent NameCourse Number – TermYearProfess.docx
 
Research these topics topics for a two to three page paper. Write th.docx
Research these topics topics for a two to three page paper. Write th.docxResearch these topics topics for a two to three page paper. Write th.docx
Research these topics topics for a two to three page paper. Write th.docx
 
Research the web to identify a SystemsSoftware Development Lifecycl.docx
Research the web to identify a SystemsSoftware Development Lifecycl.docxResearch the web to identify a SystemsSoftware Development Lifecycl.docx
Research the web to identify a SystemsSoftware Development Lifecycl.docx
 
Research the specific domains and components of the COBIT Framework..docx
Research the specific domains and components of the COBIT Framework..docxResearch the specific domains and components of the COBIT Framework..docx
Research the specific domains and components of the COBIT Framework..docx
 
Residency5COVER PAGETable of Conte.docx
Residency5COVER PAGETable of Conte.docxResidency5COVER PAGETable of Conte.docx
Residency5COVER PAGETable of Conte.docx
 
Research the role that Milton plays in Romantic writing and trac.docx
Research the role that Milton plays in Romantic writing and trac.docxResearch the role that Milton plays in Romantic writing and trac.docx
Research the role that Milton plays in Romantic writing and trac.docx
 
Research the two alternative presentation applications that yo.docx
Research the two alternative presentation applications that yo.docxResearch the two alternative presentation applications that yo.docx
Research the two alternative presentation applications that yo.docx
 
Research project oversight using the University Library.Writ.docx
Research project oversight using the University Library.Writ.docxResearch project oversight using the University Library.Writ.docx
Research project oversight using the University Library.Writ.docx
 
Research the responsibility of a critical thinker in a contemporary .docx
Research the responsibility of a critical thinker in a contemporary .docxResearch the responsibility of a critical thinker in a contemporary .docx
Research the responsibility of a critical thinker in a contemporary .docx
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 

Recently uploaded (20)

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Research topic What is the impact of Gamification on security train.docx

  • 1. Research topic: What is the impact of Gamification on security training? Ph.D. in Information Technology is my program. How is the research topic related to your major? (( Information Technology is my major)) How is the research topic connected to program goals and core courses ?? -- -- ((see attachment for core courses )) Programs goals: Contribute to organizational strategy and resiliency through IT Define shifts in national and international IT policy Leverage IT technologies to manage risk and enforce security measures Design highly scalable systems to process and analyze Big Data Empower smart cities through data science Manage data-driven decisions … identify cyber threats … improve connectivity