SlideShare a Scribd company logo
1 of 2
1. Identify a problem in the study of IT (Information Security in
the Healthcare Industry) that is current in the literature.
2. Describe the theories in the body of literature leading up to
the problem or question.
3.Analyze the methodology and research approach that would be
best to address the research question if you were a researcher
conducting an analysis of the problem from its initial stages.
4.Describe ways you would find out more about the topic and
prepare a literature review leading up to the research question.
5. Explore the topic you are seeking to address and document
how you found the foundational work, what theorists you would
use to create your research foundation and what methodology
would be best suited to addressing the problem.
6.Communicate in a manner that is scholarly, professional, and
consistent with expectations for information technology
professionals.
Submission Requirements
Written communication: Write in a professional manner using
current APA style and formatting with correct grammar, usage,
and mechanics.
Resources: Identify at least
five scholarly sources
.
APA formatting: Resources and citations are formatted
according to current APA style and formatting.
Length:
10
double-spaced, typed pages.
Font and font size: Times New Roman, 12 point.

More Related Content

More from salmonpybus

Discuss how each of these factors (inflation, changing population de.docx
Discuss how each of these factors (inflation, changing population de.docxDiscuss how each of these factors (inflation, changing population de.docx
Discuss how each of these factors (inflation, changing population de.docxsalmonpybus
 
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docxDiscuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docxsalmonpybus
 
Discuss how business use Access Control to protect their information.docx
Discuss how business use Access Control to protect their information.docxDiscuss how business use Access Control to protect their information.docx
Discuss how business use Access Control to protect their information.docxsalmonpybus
 
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docx
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docxDiscuss how and why companies use cryptography.Length, 2 – 3 pag.docx
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docxsalmonpybus
 
Discuss how and why companies use cryptography.Length, 2 pages..docx
Discuss how and why companies use cryptography.Length, 2 pages..docxDiscuss how and why companies use cryptography.Length, 2 pages..docx
Discuss how and why companies use cryptography.Length, 2 pages..docxsalmonpybus
 
Discuss how an object must be an expert on certain sets of informati.docx
Discuss how an object must be an expert on certain sets of informati.docxDiscuss how an object must be an expert on certain sets of informati.docx
Discuss how an object must be an expert on certain sets of informati.docxsalmonpybus
 
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docxDiscuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docxsalmonpybus
 
Discuss how Biblical worldview provides guidance to the Christian he.docx
Discuss how Biblical worldview provides guidance to the Christian he.docxDiscuss how Biblical worldview provides guidance to the Christian he.docx
Discuss how Biblical worldview provides guidance to the Christian he.docxsalmonpybus
 
Discuss how an IPSIDS can protect user information on a Windows sys.docx
Discuss how an IPSIDS can protect user information on a Windows sys.docxDiscuss how an IPSIDS can protect user information on a Windows sys.docx
Discuss how an IPSIDS can protect user information on a Windows sys.docxsalmonpybus
 
discuss how a particular human-computer interface might impact a per.docx
discuss how a particular human-computer interface might impact a per.docxdiscuss how a particular human-computer interface might impact a per.docx
discuss how a particular human-computer interface might impact a per.docxsalmonpybus
 
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docxDiscuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docxsalmonpybus
 
Discuss emerging trends in the use of Internet currency such as Bitc.docx
Discuss emerging trends in the use of Internet currency such as Bitc.docxDiscuss emerging trends in the use of Internet currency such as Bitc.docx
Discuss emerging trends in the use of Internet currency such as Bitc.docxsalmonpybus
 
Discuss Edward Saids concept of Orientalism and its relationship .docx
Discuss Edward Saids concept of Orientalism and its relationship .docxDiscuss Edward Saids concept of Orientalism and its relationship .docx
Discuss Edward Saids concept of Orientalism and its relationship .docxsalmonpybus
 
Discuss educational plans for preventing the spread of COVID-1.docx
Discuss educational plans for preventing the spread of COVID-1.docxDiscuss educational plans for preventing the spread of COVID-1.docx
Discuss educational plans for preventing the spread of COVID-1.docxsalmonpybus
 
Discuss e-commerce its development and future perspectives. Sourc.docx
Discuss e-commerce its development and future perspectives. Sourc.docxDiscuss e-commerce its development and future perspectives. Sourc.docx
Discuss e-commerce its development and future perspectives. Sourc.docxsalmonpybus
 
Discuss different encryption methods that are specific to Microsoft .docx
Discuss different encryption methods that are specific to Microsoft .docxDiscuss different encryption methods that are specific to Microsoft .docx
Discuss different encryption methods that are specific to Microsoft .docxsalmonpybus
 
Discuss critical infrastructure and key resources (CIKR). What are t.docx
Discuss critical infrastructure and key resources (CIKR). What are t.docxDiscuss critical infrastructure and key resources (CIKR). What are t.docx
Discuss critical infrastructure and key resources (CIKR). What are t.docxsalmonpybus
 
Discuss differences in research findings regarding sentences imposed.docx
Discuss differences in research findings regarding sentences imposed.docxDiscuss differences in research findings regarding sentences imposed.docx
Discuss differences in research findings regarding sentences imposed.docxsalmonpybus
 
Discuss cultural disparity in health care for the Hispanic commu.docx
Discuss cultural disparity in health care for the Hispanic commu.docxDiscuss cultural disparity in health care for the Hispanic commu.docx
Discuss cultural disparity in health care for the Hispanic commu.docxsalmonpybus
 
Discuss consensus-building activities you have been involved with .docx
Discuss consensus-building activities you have been involved with .docxDiscuss consensus-building activities you have been involved with .docx
Discuss consensus-building activities you have been involved with .docxsalmonpybus
 

More from salmonpybus (20)

Discuss how each of these factors (inflation, changing population de.docx
Discuss how each of these factors (inflation, changing population de.docxDiscuss how each of these factors (inflation, changing population de.docx
Discuss how each of these factors (inflation, changing population de.docx
 
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docxDiscuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
Discuss Five (5)  database membersobjects of NoSQL. Why is NoSQL is.docx
 
Discuss how business use Access Control to protect their information.docx
Discuss how business use Access Control to protect their information.docxDiscuss how business use Access Control to protect their information.docx
Discuss how business use Access Control to protect their information.docx
 
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docx
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docxDiscuss how and why companies use cryptography.Length, 2 – 3 pag.docx
Discuss how and why companies use cryptography.Length, 2 – 3 pag.docx
 
Discuss how and why companies use cryptography.Length, 2 pages..docx
Discuss how and why companies use cryptography.Length, 2 pages..docxDiscuss how and why companies use cryptography.Length, 2 pages..docx
Discuss how and why companies use cryptography.Length, 2 pages..docx
 
Discuss how an object must be an expert on certain sets of informati.docx
Discuss how an object must be an expert on certain sets of informati.docxDiscuss how an object must be an expert on certain sets of informati.docx
Discuss how an object must be an expert on certain sets of informati.docx
 
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docxDiscuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
Discuss how Angela Davis, Patricia Collins, andor The Combahee Rive.docx
 
Discuss how Biblical worldview provides guidance to the Christian he.docx
Discuss how Biblical worldview provides guidance to the Christian he.docxDiscuss how Biblical worldview provides guidance to the Christian he.docx
Discuss how Biblical worldview provides guidance to the Christian he.docx
 
Discuss how an IPSIDS can protect user information on a Windows sys.docx
Discuss how an IPSIDS can protect user information on a Windows sys.docxDiscuss how an IPSIDS can protect user information on a Windows sys.docx
Discuss how an IPSIDS can protect user information on a Windows sys.docx
 
discuss how a particular human-computer interface might impact a per.docx
discuss how a particular human-computer interface might impact a per.docxdiscuss how a particular human-computer interface might impact a per.docx
discuss how a particular human-computer interface might impact a per.docx
 
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docxDiscuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
Discuss Fluid Volume Excess. Describe the imbalance, identify typ.docx
 
Discuss emerging trends in the use of Internet currency such as Bitc.docx
Discuss emerging trends in the use of Internet currency such as Bitc.docxDiscuss emerging trends in the use of Internet currency such as Bitc.docx
Discuss emerging trends in the use of Internet currency such as Bitc.docx
 
Discuss Edward Saids concept of Orientalism and its relationship .docx
Discuss Edward Saids concept of Orientalism and its relationship .docxDiscuss Edward Saids concept of Orientalism and its relationship .docx
Discuss Edward Saids concept of Orientalism and its relationship .docx
 
Discuss educational plans for preventing the spread of COVID-1.docx
Discuss educational plans for preventing the spread of COVID-1.docxDiscuss educational plans for preventing the spread of COVID-1.docx
Discuss educational plans for preventing the spread of COVID-1.docx
 
Discuss e-commerce its development and future perspectives. Sourc.docx
Discuss e-commerce its development and future perspectives. Sourc.docxDiscuss e-commerce its development and future perspectives. Sourc.docx
Discuss e-commerce its development and future perspectives. Sourc.docx
 
Discuss different encryption methods that are specific to Microsoft .docx
Discuss different encryption methods that are specific to Microsoft .docxDiscuss different encryption methods that are specific to Microsoft .docx
Discuss different encryption methods that are specific to Microsoft .docx
 
Discuss critical infrastructure and key resources (CIKR). What are t.docx
Discuss critical infrastructure and key resources (CIKR). What are t.docxDiscuss critical infrastructure and key resources (CIKR). What are t.docx
Discuss critical infrastructure and key resources (CIKR). What are t.docx
 
Discuss differences in research findings regarding sentences imposed.docx
Discuss differences in research findings regarding sentences imposed.docxDiscuss differences in research findings regarding sentences imposed.docx
Discuss differences in research findings regarding sentences imposed.docx
 
Discuss cultural disparity in health care for the Hispanic commu.docx
Discuss cultural disparity in health care for the Hispanic commu.docxDiscuss cultural disparity in health care for the Hispanic commu.docx
Discuss cultural disparity in health care for the Hispanic commu.docx
 
Discuss consensus-building activities you have been involved with .docx
Discuss consensus-building activities you have been involved with .docxDiscuss consensus-building activities you have been involved with .docx
Discuss consensus-building activities you have been involved with .docx
 

1. Identify a problem in the study of IT (Information Security i

  • 1. 1. Identify a problem in the study of IT (Information Security in the Healthcare Industry) that is current in the literature. 2. Describe the theories in the body of literature leading up to the problem or question. 3.Analyze the methodology and research approach that would be best to address the research question if you were a researcher conducting an analysis of the problem from its initial stages. 4.Describe ways you would find out more about the topic and prepare a literature review leading up to the research question. 5. Explore the topic you are seeking to address and document how you found the foundational work, what theorists you would use to create your research foundation and what methodology would be best suited to addressing the problem. 6.Communicate in a manner that is scholarly, professional, and consistent with expectations for information technology professionals. Submission Requirements Written communication: Write in a professional manner using current APA style and formatting with correct grammar, usage, and mechanics.
  • 2. Resources: Identify at least five scholarly sources . APA formatting: Resources and citations are formatted according to current APA style and formatting. Length: 10 double-spaced, typed pages. Font and font size: Times New Roman, 12 point.