SlideShare a Scribd company logo
1 of 44
13
Dissertation Proposal and Dissertation Manuscript
Template and Guide
This cover page and template instructional content should be
removed before drafting chapters. Keep the template
instructions in a separate location for ongoing reference as you
develop chapter content within the manuscript format.
Instructions for how to use this template and guide:
· Type directly into the template at “Begin writing here...” or
“Text…”. Doing so should help to ensure the document is
properly formatted.
· Use reminders in the comments relating to formatting as well
as helpful tips for guidance purposes. Additionally, in each
main section, use the checklist relating to content so you know
what to include before you begin to organize your thoughts.
Refer to the checklist continuously as you develop each section.
As you self-evaluate each section, you can actually check off
each box by clicking on it to ensure you have met all the
requirements. Please note these lists are resources and not
meant to be exhaustive, as it is impossible to cover the details
of every method and design.
· The length of a section can vary, unless a guideline is
provided.
· Once you have developed each section, refer to the comments
and checklists one last time to be sure the section matches them
as discussed with your Chair, then delete them.
· To delete a comment, right click on the comment, then select
“Delete Comment.”. For additional strategies and guidance,
click here.
Version: October 2020
© Northcentral University, 2020
Comment by Northcentral University: Ensure every section
in the document meets the following requirements:
☐ Use 12-point and Times New Roman font.
☐ Write in the future tense when referencing the proposed study
in the dissertation proposal. Write in the past tense when
referencing the completed study in the dissertation manuscript.
☐ Use economy of expression to present information as
succinctly as possible without oversimplifying or losing the
meaning.
☐ Avoid personal opinions and claims.
☐ Support all claims in the document with recent, scholarly,
peer-reviewed sources published within 5 years of when the
dissertation will be completed, unless they are seminal sources
or no other literature exists. For additional information and
guidance relating to scholarly and peer-reviewed sources, click
here.
☐ Avoid anthropomorphism (i.e., giving human qualities to
inanimate objects) such as “The article claims…”, “The study
found…,”, or “The research explored…”.
☐ Clearly and precisely define key words upon their first use
only.
Title of the Dissertation Comment by Northcentral University:
With the exception of articles and prepositions, the first letter
of each word should be capitalized. The title should be two
single spaces (one double space) from the top of the page. In
10-15 words, it should indicate the contents of the study. The
title should be bold.
The title page should include no page number, so please recheck
pagination once the template cover page has been removed.
Dissertation Proposal
Submitted to Northcentral University
School of Business Administration
in Partial Fulfillment of the
Requirements for the Degree of
DOCTOR OFMANAGEMENT INFORMATION SYSTEMS
by
RAHKON ALLAH ROSS
La Jolla, California
October 2021
Abstract Comment by Northcentral University: The abstract
should be included in the dissertation manuscript only. It should
not be included in the dissertation proposal.
The word Abstract should be centered, bolded, and begin on its
own page.
Begin Multiple cybersecurity threats are faced by small
business owners and ransomware is one of them as it denies
access of small business owners to their data in exchange for a
specific payment. The purpose of this qualitative case study is
to better understand the impediments to the application of
ransomware specific preventative, detective, and corrective
controls by small business owners. The leaders and managers
working in small businesses can get potential benefits by
applying specific strategies and themes for the prevention of
victimization. It will bring a positive change in society by not
only supporting the local economy but also reduce the spread of
ransomware for the protection of sensitive and confidential
consumer data. Comment by Northcentral University: The text
should be left-justified (not indented) and double-spaced with
no breaks.
Acknowledgements Comment by Northcentral University: You
may include an optional acknowledgements page in normal
paragraph format in the dissertation manuscript. Do not incl ude
such a page in the dissertation proposal.
The word Acknowledgements should be centered, bolded, and
begin on its own page.
Begin writing here…
Table of Contents Comment by Northcentral University: Use
the Table of Contents feature in Word. For additional
information on creating a table of contents, click here.
For information on updating the table of contents, click here,
and for video resources from the Academic Success Center on
formatting the table of contents, click here.
Do not manually add headings into the Table of Contents. The
headings in the table of contents are populated from the Styles
gallery using the APA Level 1 and Heading 2 styles.
Only include APA heading levels 1 and 2 in the table of
contents. Use the Heading 2 style from the Styles gallery to add
level two headings in the document. Update the table of
contents to reflect any new level 2 headings added to document.
Comment by Northcentral University: For Academic
Success Center resources on formatting the table of contents,
click here. For assistance, use the videos in the Tables and
Headers tab and handouts in the Format tab. Comment by
Northcentral University: Ensure the headings in the table of
contents match those in the document. Please note the place
holders are included in this table of contents:
“XXX” under Chapter 2 must be replaced with the themes
generated from the integrative critical review of the literature.
If your study is qualitative, “Operational Definitions of
Variables” under Chapter 3 must be deleted.
“XXX” under Chapter 4 must be replaced with
“Trustworthiness” for a qualitative study, “Validity and
Reliability” for a quantitative study, and
“Trustworthiness/Validity and Reliability” for a mixed methods
study.
The number of research questions listed under Chapter 4
must align with the number of research questions in your study.
Under Appendices, each “XXX” must be replaced with the
titles of the appendix.
Chapter 1: Introduction1
Statement of the Problem2
Purpose of the Study2
Introduction to Theoretical or Conceptual Framework 3
Introduction to Research Methodology and Design4
Research Questions4
Hypotheses4
Significance of the Study5
Definitions of Key Terms6
Summary6
Chapter 2: Literature Review7
Theoretical or Conceptual Framework 7
Subtopic8
Summary8
Chapter 3: Research Method10
Research Methodology and Design10
Population and Sample10
Materials or Instrumentation11
Operational Definitions of Variables 12
Study Procedures13
Data Analysis13
Assumptions 14
Limitations14
Delimitations14
Ethical Assurances15
Summary15
Chapter 4: Findings16
XXX of the Data16
Results17
Evaluation of the Findings18
Summary18
Chapter 5: Implications, Recommendations, and Conclusions19
Implications19
Recommendations for Practice20
Recommendations for Future Research20
Conclusions20
References22
Appendix A XXX23
Appendix B XXX24
List of Tables Comment by Northcentral University: The words
List of Tables should be centered, bolded, and begin on its own
page
Use the Table of Figures feature in Word and select “Table” as
the caption label. For additional information and guidance, click
here.
Tip: For formatting the caption for tables, table headings should
be double spaced and placed above the table. The word “Table”
and the number should be bolded. The table title is in title case
and italics.
Comment by Northcentral University: Click here to review
a video from the Academic Success Center on creating the List
of Tables.
Begin list of tables here… Content will be provided once study
has started.
List of Figures Comment by Northcentral University: The words
List of Figures should be centered, bolded, and begin on its own
page
Use the Table of Figures feature in Word and select “Figure” as
the caption label. For additional information and guidance, click
here.
Tip: For formatting the caption for figures, figure headings
should be double spaced and placed above the figure. The word
“Figure” and the number should be bolded. The figure title is in
title case and italics.
Comment by Northcentral University: Click here to review
a video on creating the List of Figures.
Begin list of figures here…Content will be provided once study
has started.
1
viChapter 1: Introduction Comment by Garrett Smiley:
Requirements have not been met (see highlighted areas below).
Delete the text highlighted in yellow, as it is either incorrect or
unnecessary for this section.
Rewrite this entire section as a lead up or a ramp up to the
problem statement; it should should serve as both a introduction
to the problem space with background on what the academic
body of knowledge has to has about the current state of the
problem space. All claims must have a citation from a current,
peer reviewed journal article (this is true for any claim made in
the paper).
Checklist:
☐ Begin with an overview of the general topic to establish the
context of the study and orient the reader to the field. Do not
overstate the topic as you will address the topic more fully in
Chapter 2.
☐ Describe the larger context in which the problem exists.
☐ Present an overview of why this research topic is relevant and
warranted.
☐ Briefly explain what research has been done on the topic and
why the topic is important practically and empirically (applied
and PhD) as well as theoretically (PhD).
☐ Clearly lead the reader to the problem statement to follow.
The reader should not be surprised by the problem described
later in the document.
☐ Do not explicitly state the study problem, purpose, or
methodology, as they are discussed in subsequent sections.
☐ Devote approximately 2 to 4 pages to this section.
☐ Write in the future tense when referencing the proposed study
in the dissertation proposal. Write in the past tense when
referencing the completed study in the dissertation manuscript.
☐ There are no personal opinions in the dissertation. All work
must come from cited sources.
Multiple cybersecurity threats are faced by small business
owners and ransomware is one of them as it denies access of
small business owners to their data in exchange for a specific
payment. The purpose of this qualitative case study is to better
understand the impediments to the application of ransomware
specific preventative, detective, and corrective controls by
small business owners. The leaders and managers working in
small businesses can get potential benefits by applying specific
strategies and themes for the prevention of victimization. It will
bring a positive change in society by not only supporting the
local economy but also reduce the spread of ransomware for the
protection of sensitive and confidential consumer data.
Statement of the Problem Comment by Garrett Smiley:
Requirements have not been met (see highlighted areas below).
Add a statement that identifies what is unknown about this
problem that should be known.
Add a statement about the potential negative consequences if
the proposed study is not performed by the researcher.
Checklist:
☐ Begin with “The problem to be addressed in this study is…”
This statement should logically flow from the introduction and
clearly identify the problem to be addressed by the study
(current citations needed).
☐ Succinctly discuss the problem and provide evidence of its
existence.
☐ Identify who is impacted by the problem (e.g., individuals,
organizations, industries, or society), what is not known that
should be known about it, and what the potential negative
consequences could be if the problem is not addressed in this
study.
☐ Ensure the concepts presented are exactly the same as those
mentioned in the Purpose Statement section.
☐ Do not exceed 250-300 words.
The problem addressed in this study is ransomware is
continuing to wreak havoc since its' discovery over twenty years
ago (Dhinnesh, 2020). Small businesses continue to be regularly
attacked through the use of ransomware (Poudyal & Dasgupta,
2021).
Purpose of the Study Comment by Garrett Smiley:
Requirements have not been met (see highlighted areas below).
Include a step by step overview of how the study will be
conducted.
Identify the population.
Identify the minimum sample size and justify it using proper
citations.
Identify how the researcher will have access to data (e.g., paid
services through ServiceMonkey, Qualtrics).
Checklist:
☒ Begin with a succinct purpose statement that identifies the
study method, design, and overarching goal. The recommended
language to use is: “The purpose of this [identify research
methodology] [identify research design] study is to [identify the
goal of the dissertation that directly reflects and encompasses
the research questions to follow].”
☐ Indicate how the study is a logical, explicit research response
to the stated problem and the research questions to follow.
☐ Continue with a brief but clear step-by-step overview of how
the study will be (proposal) or was (manuscript) conducted.
☐ Identify the variables/constructs, materials/instrumentation,
and analysis.
☐ For the proposal (DP) identify the target population and
sample size needed. For the manuscript (DM), edit and list
sample size obtained.
☐ Identify the site(s) where the research will be (proposal) or
was (manuscript) conducted using general geographic terms to
avoid identifying the specific location. To avoid compromising
participants’ confidentiality or anonymity, use pseudonyms.
☐ Do not exceed one paragraph or one page.
The purpose of this qualitative case study is to better
understand the impediments for the application of ransomware
specific preventative, detective, and corrective controls by
small business owners.
Introduction to Theoretical or Conceptual Framework
Comment by Garrett Smiley: Requirements have been met.
Checklist:
☐ Identify the guiding framework. Present the key concepts,
briefly explain how they are related, and present the
propositions relevant to this study.
☐ Explain how the framework guided the research decisions,
including the development of the problem statement, purpose
statement, and research questions.
☐ If more than one framework is guiding the study, integrate
them, rather than describing them independently. Do not select
a separate framework for each variable/construct under
examination.
☐ Do not exceed two pages. A more thorough discussion of the
theoretical/conceptual framework will be included in Chapter 2.
The theoretical framework is used to explain this study is
known as the routine activity theory that was introduced by
Cohen and Felson in 1979 (Holt et al., 2020). This framework is
most appropriate in the given study because it shows how
having effective protection of systems against ransomware can
offer prevention of infections. This is a criminology theory that
is based on examining the victimization and offences of
cybercrime (de Melo et al., 2018). It will help in understanding
the application of ransomware and for the development of
controls including preventive, corrective and detective controls.
Introduction to Research Methodology and Design Comment by
Garrett Smiley: Requirements have not been met (see
highlighted areas below).
Delete the text highlighted in yellow, as it is either incorrect or
unnecessary for this section.
Rewrite this entire section to justify the selection of the
research methodology (i.e., qualitative) and research design
(i.e., case study). Define and justify these selections using
proper citations.
Checklist:
☐ Provide a brief discussion of the methodology and design to
include a description of the data collection procedure and
analysis. Do not include specific details regarding why the
methodology and design were selected over others. More
detailed information will be included in Chapter 3.
☐ Cite the seminal works related to the selected methodology
and design.
☐ Indicate why the selected research methodology and design
are the best choices for the study by explaining how they align
with the problem and purpose statements as well as the research
questions. Do not simply list and describe various research
methodologies and designs.
☐ Devote approximately one to two pages to this section.
This is a qualitative study in which the collection of mixed -
method will be used for selecting numerous designs of case
studies so that effective study of small businesses will offer
better control strategies in addressing the issue of ransomware.
The design takes into account multiple small businesses for
interviewing that have effective control strategies (Malecki,
2019). These interviews are ultimately very helpful in
understanding the market dynamics and ways of preventing,
correcting and detecting ransomware in small businesses
(Tuttle, 2020).
Research Questions Comment by Garrett Smiley: Requirements
have been met.
Checklist:
☐ Present research questions directly answerable, specific, and
testable within the given timeframe and location identified in
the problem and purpose statements.
☐ Include the exact same variables/constructs, participants, and
location mentioned in the problem and purpose statements. No
new variables/constructs should be introduced.
RQ1
What are the impediments for the application of ransomware
specific preventative controls by small business owners?
RQ2What are the impediments for the application of
ransomware specific detective controls by small business
owners?
RQ3
What are the impediments for the application of ransomware
specific corrective controls by small business
owners?Significance of the Study Comment by Garrett
Smiley: Requirements have not been met (see highlighted areas
below).
Provide citations for all of the claims in this section.
Checklist:
☐ Describe why the study is important and how it can
contribute to the field of study.
☐ For applied studies, explain how the results might both be
significant to leaders and practitioners in the field and
contribute to the literature. For PhD studies, explain how the
results advance the guiding framework and contribute to the
literature.
☐ Describe the benefits of addressing the study problem,
achieving the study purpose, and answering the research
questions. Whereas the problem statement should articulate the
negative consequences of not conducting the study, this section
should highlight the positive consequences of completing the
study.
☐ Do not exceed one page.
The significance of this study states that it can contribute a lot
towards helping small business owners to become more
informed regarding the implications of controls relating to
cyber security so that they can improve business operations.
Most of the time, small business owners are not informed about
the magnitude of ransomware threats. Some business owners
can learn through experience how to strengthe n and mitigate
their cyber security while reducing the negative consequences
of ransomware attacks. Most of the time, small business owners
provide information to promote stability and safety while being
in their locus of control and managing all cost-effectively.
There is a more sophisticated type of information system being
used in large businesses compared to small companies, which
can help improve the strategies of small companies and adjust
them according to the target company. This means that it is
necessary to understand complex information systems and also
improve subcomponents for better implementation.
Definitions of Key Terms Comment by Garrett Smiley:
Requirements have not been met (see highlighted areas below).
Alphabetize the terms.
Separate the final term into two terms.
Checklist:
☐ Alphabetize and bold terms directly related to the dissertation
topic and not commonly used or understood.
☐ Paraphrase the definitions of the terms using complete
sentences and provide a citation for each one.
☐ Do not define theories, conceptual frameworks, statistical
analyses, methodological terms, or the variables/constructs
under examination.
Term 1
Ransomware: Ransomware is a type of online virus that is used
for getting money from victims (Young & Yung, 2017).
Term 2
Guardianship: Guardianship is the concept of protection in
which the elements of surveillance are used for getting
prevention from crime (Young & Yung, 2017).
Term 3
Detective controls: Detective controls are the controls that are
used for detecting ransomware any kind of online virus that can
be harmful to the information system (Williams et al, 2020).
Term 4
Preventive and corrective controls: Preventive and corrective
controls are helpful in not only developing preventive strategies
but also having a proper corrective system to overcome the
issue in case of any cyber-attack (Williams et al, 2020).
Summary Comment by Garrett Smiley: Requirements have been
met.
Checklist:
☐ Briefly restate the key points discussed in the chapter.
Review the headings and/or table of contents to ensure all key
points are covered.
The problem addressed in this study is ransomware is
continuing to wreak havoc since its' discovery over twenty years
ago (Dhinnesh, 2020). Small businesses continue to be regul arly
attacked through the use of ransomware (Poudyal & Dasgupta,
2021). The purpose of this qualitative case study is to better
understand the impediments to the application of ransomware-
specific preventative, detective, and corrective controls by
small business owners. The theoretical framework used to
explain this study is known as the routine activity theory
introduced by Cohen and Felson in 1979 (Holt et al., 2020).
This framework is most appropriate in the given study because
it shows how having adequate protection of systems against
ransomware can offer prevention of infections. This study is
very significant in identifying the usefulness of developing
preventive and control strategies against ransomware. Most of
the time, small business owners are not informed about the
magnitude of ransomware threats. Some business owners can
learn through experience how to strengthen and mitigate their
cyber security while reducing the negative consequences of
ransomware attacks. This study will provide help to smal l
business owners in overcoming these issues and protecting their
data. Chapter 2: Literature Review Comment by Garrett
Smiley: Section missing: Introduction
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Begin with the first sentence of the purpose statement and
problem statement that leads to a brief explanation of the
organization of the literature review. Do not simply cut and
paste the Purpose Statement section from Chapter 1.
☐ Provide an overview of the sub-headings in the literature that
will be discussed.
☐ At the end of this section, indicate the databases accessed and
the search engines used. Discuss all the search parameters,
including the search terms and their combinations (with more
detailed search terms located in an appendix, if appropriate),
range of years, and types of literature.
☐ Devote approximately 30 to 60 pages to this chapter to
include citations to at least 50 relevant sources.
Begin writing here…
Checklist:
☐ Begin with the first sentence of the purpose statement and
problem statement that leads to a brief explanation of the
organization of the literature review. Do not simply cut and
paste the Purpose Statement section from Chapter 1.
☐ Provide an overview of the sub-headings in the literature that
will be discussed.
☐ At the end of this section, indicate the databases accessed and
the search engines used. Discuss all the search parameters,
including the search terms and their combinations (with more
detailed search terms located in an appendix, if appropriate),
range of years, and types of literature.
☐ Devote approximately 30 to 60 pages to this chapter to
include citations to at least 50 relevant sources.Theoretical or
Conceptual Framework Comment by Garrett Smiley: Section
missing: Theoretical or Conceptual Framework
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Describe the guiding theoretical/conceptual framework of the
study, including the definitions of all the concepts, an
explanation of the relationships among the concepts, and a
presentation of all the assumptions and propositions.
☐ Explain the origin and development of the framework.
Demonstrate detailed knowledge of and familiarity with both
the historical and the current literature on the framework.
☐ Identify existing research studies that used this framework in
a similar way. Mention alternative frameworks, with a
justification of why the selected framework was chosen.
☐ Describe how and why the selected framework relates to the
present study and how it guided the development of the problem
statement, purpose statement, and research questions.
Begin writing here…
Checklist:
☐ Describe the guiding theoretical/conceptual framework of the
study, including the definitions of all the concepts, an
explanation of the relationships among the concepts, and a
presentation of all the assumptions and propositions.
☐ Explain the origin and development of the framework.
Demonstrate detailed knowledge of and familiarity with both
the historical and the current literature on the framework.
☐ Identify existing research studies that used this framework in
a similar way. Mention alternative frameworks, with a
justification of why the selected framework was chosen.
☐ Describe how and why the selected framework relates to the
present study and how it guided the development of the problem
statement, purpose statement, and research questions. Subtopic
Comment by Garrett Smiley: Section missing: Subtopic
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Critically analyze (i.e., note the strengths and weaknesses)
and synthesize (i.e., integrate) the existing research. Rather than
reporting on each study independently, describe everything
known on the topic by reviewing the entire body of work.
☐ Present a balanced integrative critical review of the
literature, ensuring all points of view are included. Cover all the
important issues with a discussion of areas of convergence (i.e.,
agreement) and divergence (i.e., disagreement). Provide
potential explanations for areas of divergence.
☐ Address issues of authority, audience, and/or bias/point of
view in the sources used.
Begin writing here…
Level 3 Heading
Text...
Level 4 Heading. Text...
Checklist:
☐ Critically analyze (i.e., note the strengths and weaknesses)
and synthesize (i.e., integrate) the existing research. Rather than
reporting on each study independently, describe everything
known on the topic by reviewing the entire body of work.
☐ Present a balanced integrative critical review of the
literature, ensuring all points of view are included. Cover all the
important issues with a discussion of areas of convergence (i.e.,
agreement) and divergence (i.e., disagreement). Provide
potential explanations for areas of divergence.
☐ Address issues of authority, audience, and/or bias/point of
view in the sources used.
Table 1. Summary of Selected X Studies
Study
Methodology
Sample
Instruments/Constructs
Main findings or contribution
Insert Citation here
Insert Methodology Here
Insert Sample Here
Insert Instruments/Constructs Here
Insert Summary Here.
Insert Citation here
Insert Methodology Here
Insert Sample Here
Insert Instruments/Constructs Here
Insert Summary Here.
Summary Comment by Garrett Smiley: Section missing:
Summary
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Briefly restate the key points discussed in the chapter.
Review the headings and/or table of contents to ensure all key
points are covered.
☐ Highlight areas of convergence and divergence as wel l as
gaps in the literature that support the need for the study. This
discussion should logically lead to Chapter 3, where the
research methodology and design will be discussed.
Begin writing here…
Checklist:
☐ Briefly restate the key points discussed in the chapter.
Review the headings and/or table of contents to ensure all key
points are covered.
☐ Highlight areas of convergence and divergence as well as
gaps in the literature that support the need for the study. This
discussion should logically lead to Chapter 3, where the
research methodology and design will be discussed.
Chapter 3: Research Method Comment by Garrett Smiley:
Section missing: Introduction
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Begin with an introduction and restatement of the problem
and purpose sentences verbatim.
☐ Provide a brief overview of the contents of this chapter,
including a statement that identifies the research methodology
and design.
Begin writing here…
Checklist:
☐ Begin with an introduction and restatement of the problem
and purpose sentences verbatim.
☐ Provide a brief overview of the contents of this chapter,
including a statement that identifies the research methodology
and design.Research Methodology and Design Comment by
Garrett Smiley: Section missing: Research Methodology and
Design
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Describe the research methodology and design. Elaborate
upon their appropriateness in relation to the study problem,
purpose, and research questions.
☐ Identify alternative methodologies and designs and indicate
why they were determined to be less appropriate than the ones
selected. Do not simply list and describe research
methodologies and designs in general.
Begin writing here…
Checklist:
☐ Describe the research methodology and design. Elaborate
upon their appropriateness in relation to the study problem,
purpose, and research questions.
☐ Identify alternative methodologies and designs and indicate
why they were determined to be less appropriate than the ones
selected. Do not simply list and describe research
methodologies and designs in general. Population and Sample
Comment by Garrett Smiley: Section missing: Population
and Sample
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Describe the population, including the estimated size and
relevant characteristics.
☐ Explain why the population is appropriate, given the study
problem, purpose, and research questions.
☐ Describe the sample that will be (proposal) or was
(manuscript) obtained.
☐ Explain why the sample is appropriate, given the study
problem, purpose, and research questions.
☐ Explain the type of sampling used and why it is appropriate
for the dissertation proposal methodology and design. For
qualitative studies, evidence must be presented that saturation
will be (proposal) or was (manuscript) reached. For quantitative
studies, a power analysis must be reported to include the
parameters (e.g., effect size, alpha, beta, and number of groups)
included, and evidence must be presented that the minimum
required sample size will be (proposal) or was (manuscript)
reached.
☐ Describe how the participants will be (proposal) or were
(manuscript) recruited (e.g., email lists from professional
organizations, flyers) and/or the data will be (proposal) or were
(manuscript) obtained (e.g., archived data, public records) with
sufficient detail so the study could be replicated.
Begin writing here…
Checklist:
☐ Describe the population, including the estimated size and
relevant characteristics.
☐ Explain why the population is appropriate, given the study
problem, purpose, and research questions.
☐ Describe the sample that will be (proposal) or was
(manuscript) obtained.
☐ Explain why the sample is appropriate, given the study
problem, purpose, and research questions.
☐ Explain the type of sampling used and why it is appropriate
for the dissertation proposal methodology and design. For
qualitative studies, evidence must be presented that saturation
will be (proposal) or was (manuscript) reached. For quantitative
studies, a power analysis must be reported to include the
parameters (e.g., effect size, alpha, beta, and number of groups)
included, and evidence must be presented that the minimum
required sample size will be (proposal) or was (manuscript)
reached.
☐ Describe how the participants will be (proposal) or were
(manuscript) recruited (e.g., email lists from professional
organizations, flyers) and/or the data will be (proposal) or were
(manuscript) obtained (e.g., archived data, public records) with
sufficient detail so the study could be replicated. Materials or
Instrumentation Comment by Garrett Smiley: Section
missing: Materials or Instrumentation
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Describe the instruments (e.g., tests, questionnaires,
observation protocols) that will be (proposal) or were
(manuscript) used, including information on their origin and
evidence of their reliability and validity. OR as appli cable,
describe the materials to be used (e.g., lesson plans for
interventions, webinars, or archived data, etc.).
☐ Describe in detail any field testing or pilot testing of
instruments to include their results and any subsequent
modifications.
☐ If instruments or materials are used that were developed by
another researcher, include evidence in the appendix that
permission was granted to use the instrument(s) and/or
material(s) and refer to that fact and the appendix in this
section.
Begin writing here…
Checklist:
☐ Describe the instruments (e.g., tests, questionnaires,
observation protocols) that will be (proposal) or were
(manuscript) used, including information on their origin and
evidence of their reliability and validity. OR as applicable,
describe the materials to be used (e.g., lesson plans for
interventions, webinars, or archived data, etc.).
☐ Describe in detail any field testing or pilot testing of
instruments to include their results and any subsequent
modifications.
☐ If instruments or materials are used that were developed by
another researcher, include evidence in the appendix that
permission was granted to use the instrument(s) and/or
material(s) and refer to that fact and the appendix in this
section.Operational Definitions of Variables Comment by
Garrett Smiley: Section missing: Operational Definitions of
Variables
Requirements have not been met (see highlighted areas below).
Checklist:
☐ For quantitative and mixed methods studies, identify how
each variable will be (proposal) or was (manuscript) used in the
study. Use terminology appropriate for the selected statistical
test (e.g., independent/dependent, predictor/criterion, mediator,
moderator).
☐ Base the operational definitions on published research and
valid and reliable instruments.
☐ Identify the specific instrument that will be (proposal) or was
(manuscript) used to measure each variable.
☐ Describe the level of measurement of each variable (e.g.,
nominal, ordinal, interval, ratio), potential scores for each
variable (e.g., the range [0–100] or levels [low, medium, high]),
and data sources. If appropriate, identify what specific scores
(e.g., subscale scores, total scores) will be (proposal) or were
(manuscript) included in the analysis and how they will be
(proposal) or were (manuscript) derived (e.g., calculating the
sum, difference, average).
Begin writing here...
XXX
Text…
Checklist:
☐ For quantitative and mixed methods studies, identify how
each variable will be (proposal) or was (manuscript) used in the
study. Use terminology appropriate for the selected statistical
test (e.g., independent/dependent, predictor/criterion, mediator,
moderator).
☐ Base the operational definitions on published research and
valid and reliable instruments.
☐ Identify the specific instrument that will be (proposal) or was
(manuscript) used to measure each variable.
☐ Describe the level of measurement of each variable (e.g.,
nominal, ordinal, interval, ratio), potential scores for each
variable (e.g., the range [0–100] or levels [low, medium, high]),
and data sources. If appropriate, identify what specific scores
(e.g., subscale scores, total scores) will be (proposal) or were
(manuscript) included in the analysis and how they will be
(proposal) or were (manuscript) derived (e.g., calculating the
sum, difference, average). Study Procedures Comment by
Garrett Smiley: Section missing: Study Procedures
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Describe the exact steps that will be (proposal) or were
(manuscript) followed to collect the data, addressing what data
as well as how, when, from where, and from whom those data
will be (proposal) or were (manuscript) collected in enough
detail the study can be replicated.
Begin writing here…
Checklist:
☐ Describe the exact steps that will be (proposal) or were
(manuscript) followed to collect the data, addressing what data
as well as how, when, from where, and from whom those data
will be (proposal) or were (manuscript) collected in enough
detail the study can be replicated. Data Analysis Comment by
Garrett Smiley: Section missing: Data Analysis
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Describe the strategies that will be (proposal) or were
(manuscript) used to code and/or analyze the data, and any
software that will be (proposal) or was (manuscript) used.
☐ Ensure the data that will be (proposal) or were (manuscript)
analyzed can be used to answer the research questions and/or
test the hypotheses with the ultimate goal of addressing the
identified problem.
☐ Use proper terminology in association with each
design/analysis (e.g., independent variable and dependent
variable for an experimental design, predictor and criterion
variables for regression).
☐ For quantitative studies, describe the analysis that will be
(proposal) or was (manuscript) used to test each hypothesis.
Provide evidence the statistical test chosen is appropriate to test
the hypotheses and the data meet the assumptions of the
statistical tests.
☐ For qualitative studies, describe how the data will be
(proposal) or were (manuscript) processed and analyzed,
including any triangulation efforts. Explain the role of the
researcher.
☐ For mixed methods studies, include all of the above.
Begin writing here…
Checklist:
☐ Describe the strategies that will be (proposal) or were
(manuscript) used to code and/or analyze the data, and any
software that will be (proposal) or was (manuscript) used.
☐ Ensure the data that will be (proposal) or were (manuscript)
analyzed can be used to answer the research questions and/or
test the hypotheses with the ultimate goal of addressing the
identified problem.
☐ Use proper terminology in association with each
design/analysis (e.g., independent variable and dependent
variable for an experimental design, predictor and criterion
variables for regression).
☐For quantitative studies, describe the analysis that will be
(proposal) or was (manuscript) used to test each hypothesis.
Provide evidence the statistical test chosen is appropriate to test
the hypotheses and the data meet the assumptions of the
statistical tests.
☐For qualitative studies, describe how the data will be
(proposal) or were (manuscript) processed and analyzed,
including any triangulation efforts. Explain the role of the
researcher.
☐For mixed methods studies, include all of the
above.Assumptions Comment by Garrett Smiley: Section
missing: Assumptions
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Discuss the assumptions along with the corresponding
rationale underlying them.
Begin writing here…
Checklist:
☐ Discuss the assumptions along with the corresponding
rationale underlying them. Limitations Comment by Garrett
Smiley: Section missing: Limitations
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Describe the study limitations.
☐ Discuss the measures taken to mitigate these limitations.
Begin writing here…
Checklist:
☐ Describe the study limitations.
☐ Discuss the measures taken to mitigate these limitations.
Delimitations Comment by Garrett Smiley: Section missing:
Delimitations
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Describe the study delimitations along with the corresponding
rationale underlying them. An example of delimitations are the
conditions and parameters set intentionally by the researcher or
by selection of the population and sample.
☐ Explain how these research decisions relate to the existing
literature and theoretical/conceptual framework, problem
statement, purpose statement, and research questions.
Begin writing here…
Checklist:
☐ Describe the study delimitations along with the corresponding
rationale underlying them. An example of delimitations are the
conditions and parameters set intentionally by the researcher or
by selection of the population and sample.
☐ Explain how these research decisions relate to the existing
literature and theoretical/conceptual framework, problem
statement, purpose statement, and research questions. Ethical
Assurances Comment by Garrett Smiley: Section missing:
Ethical Assurances
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Confirm in a statement the study will (proposal) or did
(manuscript) receive approval from Northcentral University’s
Institutional Review Board (IRB) prior to data collection.
☐ If the risk to participants is greater than minimal, discuss the
relevant ethical issues and how they will be (proposal) or were
(manuscript) addressed.
☐ Describe how confidentiality or anonymity will be (proposal)
or was (manuscript) achieved.
☐ Identify how the data will be (proposal) or were (manuscript)
securely stored in accordance with IRB requirements.
☐ Describe the role of the researcher in the study. Discuss
relevant issues, including biases as well as personal and
professional experiences with the topic, problem, or context.
Present the strategies that will be (proposal) or were
(manuscript) used to prevent these biases and experiences from
influencing the analysis or findings.
☐ In the dissertation manuscript only, include the IRB approval
letter in an appendix.
Begin writing here…
Checklist:
☐ Confirm in a statement the study will (proposal) or did
(manuscript) receive approval from Northcentral University’s
Institutional Review Board (IRB) prior to data collection.
☐ If the risk to participants is greater than minimal, discuss the
relevant ethical issues and how they will be (proposal) or were
(manuscript) addressed.
☐ Describe how confidentiality or anonymity will be (proposal)
or was (manuscript) achieved.
☐ Identify how the data will be (proposal) or were (manuscript)
securely stored in accordance with IRB requirements.
☐ Describe the role of the researcher in the study. Discuss
relevant issues, including biases as well as personal and
professional experiences with the topic, problem, or context.
Present the strategies that will be (proposal) or were
(manuscript) used to prevent these biases and experiences from
influencing the analysis or findings.
☐ In the dissertation manuscript only, include the IRB approval
letter in an appendix.Summary Comment by Garrett Smiley:
Section missing: Summary
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Summarize the key points presented in the chapter.
☐ Logically lead the reader to the next chapter on the findings
of the study.
Begin writing here…
Checklist:
☐ Summarize the key points presented in the chapter.
☐ Logically lead the reader to the next chapter on the findings
of the study.
Chapter 4: Findings Comment by Garrett Smiley: Section
missing: Introduction
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Begin with an introduction and restatement of the problem
and purpose sentences verbatim and the organization of the
chapter.
☐ Organize the entire chapter around the research
questions/hypotheses.
Begin writing here…
Checklist:
☐ Begin with an introduction and restatement of the problem
and purpose sentences verbatim and the organization of the
chapter.
☐ Organize the entire chapter around the research
questions/hypotheses. Trustworthiness/Validity and Reliability
of the Data Comment by Garrett Smiley: Section missing:
Trustworthiness/Validity and Reliability of the Data
Requirements have not been met (see highlighted areas below) .
Checklist:
☐ For qualitative studies, clearly identify the means by which
the trustworthiness of the data was established. Discuss
credibility (e.g., triangulation, member checks), transferability
(e.g., the extent to which the findings are generalizable to other
situations), dependability (e.g., an in-depth description of the
methodology and design to allow the study to be repeated), and
confirmability (e.g., the steps to ensure the data and findings
are not due to participant and/or researcher bias).
☐ For quantitative studies, explain the extent to which the data
meet the assumptions of the statistical test and identify any
potential factors that might impact the interpretation of the
findings. Provide evidence of the psychometric soundness (i.e.,
adequate validity and reliability) of the instruments from the
literature as well as in this study (as appropriate). Do not
merely list and describe all the measures of validity and
reliability.
☐ Mixed methods studies should include discussions of the
trustworthiness of the data as well as validity and reliability.
Begin writing here…
Checklist:
☐ For qualitative studies, clearly identify the means by which
the trustworthiness of the data was established. Discuss
credibility (e.g., triangulation, member checks), transferability
(e.g., the extent to which the findings are generalizable to other
situations), dependability (e.g., an in-depth description of the
methodology and design to allow the study to be repeated), and
confirmability (e.g., the steps to ensure the data and findings
are not due to participant and/or researcher bias).
☐ For quantitative studies, explain the extent to which the data
meet the assumptions of the statistical test and identify any
potential factors that might impact the interpretation of the
findings. Provide evidence of the psychometric soundness (i.e.,
adequate validity and reliability) of the instruments from the
literature as well as in this study (as appropriate). Do not
merely list and describe all the measures of validity and
reliability.
☐ Mixed methods studies should include discussions of the
trustworthiness of the data as well as validity and
reliability.Results Comment by Garrett Smiley: Section
missing: Results
Requirements have not been met (see highlighted areas bel ow).
Checklist:
☐ Briefly discuss the overall study. Organize the presentation
of the results by the research questions/hypotheses.
☐ Objectively report the results of the analysis without
discussion, interpretation, or speculation.
☐ Provide an overview of the demographic information
collected. It can be presented in a table. Ensure no potentially
identifying information is reported.
Begin writing here…
Checklist:
☐ Briefly discuss the overall study. Organize the presentation
of the results by the research questions/hypotheses.
☐ Objectively report the results of the analysis without
discussion, interpretation, or speculation.
☐ Provide an overview of the demographic information
collected. It can be presented in a table. Ensure no potentially
identifying information is reported.
Research Question 1/Hypothesis Comment by Garrett
Smiley: Section missing: Research Question 1/Hypothesis
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Report all the results (without discussion) salient to the
research question/hypothesis. Identify common themes or
patterns.
☐ Use tables and/or figures to report the results as appropriate.
☐ For quantitative studies, report any additional descriptive
information as appropriate. Identify the assumptions of the
statistical test and explain how the extent to which the data met
these assumptions was tested. Report any violations and
describe how they were managed as appropriate. Make decisions
based on the results of the statistical analysis. Incl ude relevant
test statistics, p values, and effect sizes in accordance with APA
requirements.
☐ For qualitative studies, describe the steps taken to analyze
the data to explain how the themes and categories were
generated. Include thick descriptions of the participants’
experiences. Provide a comprehensive and coherent
reconstruction of the information obtained from all the
participants.
☐ For mixed methods studies, include all of the above.
Text…
☐ Report all the results (without discussion) salient to the
research question/hypothesis. Identify common themes or
patterns.
☐Use tables and/or figures to report the results as appropriate.
☐ For quantitative studies, report any additional descriptive
information as appropriate. Identify the assumptions of the
statistical test and explain how the extent to which the data met
these assumptions was tested. Report any violations and
describe how they were managed as appropriate. Make decisions
based on the results of the statistical analysis. Include relevant
test statistics, p values, and effect sizes in accordance with APA
requirements.
☐ For qualitative studies,describe the steps taken to analyze the
data to explain how the themes and categories were generated.
Include thick descriptions of the participants’ experiences.
Provide a comprehensive and coherent reconstruction of the
information obtained from all the participants.
☐ For mixed methods studies,include all of the above.
Figure 1. Insert Figure Title Here
Evaluation of the Findings Comment by Garrett Smiley:
Section missing: Evaluation of the Findings
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Interpret the results in light of the existing research and
theoretical or conceptual framework (as discussed in Chapters 1
and 2). Briefly indicate the extent to which the results were
consistent with existing research and theory.
☐ Organize this discussion by research question/hypothesis.
☐ Do not draw conclusions beyond what can be interpreted
directly from the results.
☐ Devote approximately one to two pages to this section.
Begin writing here…
Checklist:
☐ Interpret the results in light of the existing research and
theoretical or conceptual framework (as discussed in Chapters 1
and 2). Briefly indicate the extent to which the results were
consistent with existing research and theory.
☐ Organize this discussion by research question/hypothesis.
☐ Do not draw conclusions beyond what can be interpreted
directly from the results.
☐ Devote approximately one to two pages to this
section.Summary Comment by Garrett Smiley: Section
missing: Summary
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Summarize the key points presented in the chapter.
Begin writing here…
Checklist:
☐ Summarize the key points presented in the chapter.
Chapter 5: Implications, Recommendations, and Conclusions
Comment by Garrett Smiley: Section missing: Introduction
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Begin with an introduction and restatement of the problem
and purpose sentences verbatim, and a brief review of
methodology, design, results, and limitations.
☐ Conclude with a brief overview of the chapter.
Begin writing here…
Checklist:
☐ Begin with an introduction and restatement of the problem
and purpose sentences verbatim, and a brief review of
methodology, design, results, and limitations.
☐ Conclude with a brief overview of the chapter.Implications
Comment by Garrett Smiley: Section missing: Implications
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Organize the discussion around each research question and
(when appropriate) hypothesis individually. Support all the
conclusions with one or more findings from the study.
☐ Discuss any factors that might have influenced the
interpretation of the results.
☐ Present the results in the context of the study by describing
the extent to which they address the study problem and purpose
and contribute to the existing literature and framework
described in Chapter 2.
☐ Describe the extent to which the results are consistent with
existing research and theory and provide potential explanations
for unexpected or divergent results.
☐ Identify the most significant implications and consequences
of the dissertation (whether positive and/or negative) to
society/desired societal outcomes and distinguish probable from
improbable implications.
Begin writing here…
Checklist:
☐ Organize the discussion around each research question and
(when appropriate) hypothesis individually. Support all the
conclusions with one or more findings from the study.
☐ Discuss any factors that might have influenced the
interpretation of the results.
☐ Present the results in the context of the study by describing
the extent to which they address the study problem and purpose
and contribute to the existing literature and framework
described in Chapter 2.
☐ Describe the extent to which the results are consistent with
existing research and theory and provide potential explanations
for unexpected or divergent results.
☐ Identify the most significant implications and consequences
of the dissertation (whether positive and/or negative) to
society/desired societal outcomes and distinguish probable from
improbable implications.
Research Question 1/Hypothesis
Text…Recommendations for Practice Comment by Garrett
Smiley: Section missing: Recommendations for Practice
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Discuss recommendations for how the findings of the study
can be applied to practice and/or theory. Support all the
recommendations with at least one finding from the study and
frame them in the literature from Chapter 2.
☐ Do not overstate the applicability of the findings.
Begin writing here…
Checklist:
☐ Discuss recommendations for how the findings of the study
can be applied to practice and/or theory. Support all the
recommendations with at least one finding from the study and
frame them in the literature from Chapter 2.
☐ Do not overstate the applicability of the
findings.Recommendations for Future Research Comment by
Garrett Smiley: Section missing: Recommendations for Future
Research
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Based on the framework, findings, and implications, explain
what future researchers might do to learn from and build upon
this study. Justify these explanations.
☐ Discuss how future researchers can improve upon this study,
given its limitations.
☐ Explain what the next logical step is in this line of resear ch.
Begin writing here…
Checklist:
☐ Based on the framework, findings, and implications, explain
what future researchers might do to learn from and build upon
this study. Justify these explanations.
☐ Discuss how future researchers can improve upon this study,
given its limitations.
☐ Explain what the next logical step is in this line of research.
Conclusions Comment by Garrett Smiley: Section missing:
Conclusions
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Provide a strong, concise conclusion to include a summary of
the study, the problem addressed, and the importance of the
study.
☐ Present the “take-home message” of the entire study.
☐ Emphasize what the results of the study mean with respect to
previous research and either theory (PhD studies) or practice
(applied studies).
Begin writing here…
Checklist:
☐ Provide a strong, concise conclusion to include a summary of
the study, the problem addressed, and the importance of the
study.
☐ Present the “take-home message” of the entire study.
☐ Emphasize what the results of the study mean with respect to
previous research and either theory (PhD studies) or practice
(applied studies).
References Comment by Garrett Smiley: Section missing:
References
Correct your APA errors here. Here’s some example references
that are properly formatted:
Ajournalarticle, R. H., Spud, P. T., & Psychologist, R. M.
(2016). Title of journal article goes here. Journal of Research in
Personality, 22, 236-252. https://doi.org/doi:10.1016/0032-
026X.56.6.895*
B’Onlinesourcesareconfusing, S. O. (2010). Search for answers
at apastyle.org and include issue numbers after volume numbers
when there is no DOI. Journal of Articles Without Digital
Object Identifiers, 127 (3), 816-826.
Cmagazinearticle, B. E. (2009, July). Note the last names on
this page: Each source type has to be formatted in a different
way. [Special issue]. Prose Magazine, 126 (5), 96-134.
Dbookreference, S. M., Orman, T. P., & Carey, R. (1967).
Google scholar’s “cite” feature is usually accurate and time-
saving. Pearson.
O’encyclopedia, S. E. (1993). Words. In The new encyclopedia
Britannica (vol. 38, pp. 745-758). Chicago, IL: Penguin.
Pchapter, P. R., & Inaneditedvolume, J. C. (2001). Scientific
research papers provide evidence of frustration with giant style
manuals. In P. Z. Wildlifeconservation, R. Dawkins, & J. H.
Dennett (Eds.), Research papers are hard work but boy are they
good for you (pp. 123-256). New York, NY: Simon & Schuster.
Qosenberg, Morris. (1994, September 11). This is how you cite
an online news article that has an author. The Washington Post.
http://www.washingtonpost.com/dir/subdir/2014/05/11/a-d9-
11e3_story.html
Checklist:
☐ Please go through and correct all references; use the easy to
understand reference examples that I have provided in my
tailored template. The key is to make sure you adhere rigidly to
the respective example (with the most common example being
that for a journal article).
☐ Create your reference list as you develop each section. As
each citation is included in the paper, insert the reference in this
section.
☐ For each reference that is listed, there must be at least one
corresponding citation within the body of the text and vice
versa.
☐ The references should be alphabetized by the last name of the
first author.
☐ If using a citation software, ensure all information is
included and properly formatted. Although such programs can
be helpful, they are not always correct.
Young, A., & Yung, M. (2017). Cryptovirology: The birth,
neglect, and explosion of ransomware. Communications of the
ACM, 60(7), 24-26. Doi:10.1145/3097347
Holt, T. J., Leukfeldt, R., & van de Weijer, S. (2020). An
examination of motivation and routine activity theory to
account for cyberattacks against Dutch web sites. Criminal
Justice and Behavior, 47(4), 487-505.
Dhinnesh, N. (2020). Analysis of ransomware and its
prevention. Global Research and Development Journal For
Engineering, 5(3), 1-4.
Poudyal, S., & Dasgupta, D. (2021). Analysis of crypto-
ransomware using ML-based multi-level profiling. IEEE
Access, 9, 122532-122547. Https://doi:
10.1109/ACCESS.2021.3109260.
Williams, C., Donaldson, S., & Siegel, S. (2020). Cyberdefense
Concepts. In Building an Effective Security Program (pp. 55-
79). De Gruyter.
de Melo, S. N., Pereira, D. V., Andresen, M. A., & Matias, L. F.
(2018). Spatial/temporal variations of crime: A routine activity
theory perspective. International journal of offender therapy and
comparative criminology, 62(7), 1967-1991.
Malecki, F. (2019). Best practices for preventing and recovering
from a ransomware attack. Computer Fraud &
Security, 2019(3), 8-10.
Tuttle, W. J. (2020). Effective Strategies Small Business
Leaders Use to Address Ransomware (Doctoral dissertation,
Walden University).
Appendix X: XXX
XXX Comment by Garrett Smiley: Section missing:
Appendices
Requirements have not been met (see highlighted areas below).
Checklist:
☐ Remove all boilerplate and make sure that you have
appendices for all pertinent areas: IRB approval letter,
instruments/surveys, site permission letters, instrument/survey
permission letters, etc.
☐ Each appendix that is referenced in the text should appear in
this section at the end of the manuscript. Appendices should be
listed in the order in which they are referenced in the text.
☐ Remember to include each appendix in your Table of
Contents
☐ Be sure to de-identify all materials so that readers cannot
identify participants or where the data were specifically
collected.
Insert Appendix X content here…

More Related Content

Similar to 13Dissertation Proposal and Dissertation Manuscript

Expectations for Short Papers Leadership & EthicsIntroducti.docx
Expectations for Short Papers Leadership & EthicsIntroducti.docxExpectations for Short Papers Leadership & EthicsIntroducti.docx
Expectations for Short Papers Leadership & EthicsIntroducti.docxrhetttrevannion
 
Chapter 1 IntroductionIntroductionIn this section, present.docx
Chapter 1 IntroductionIntroductionIn this section, present.docxChapter 1 IntroductionIntroductionIn this section, present.docx
Chapter 1 IntroductionIntroductionIn this section, present.docxketurahhazelhurst
 
BA634 Current & Emerging Technology Research Paper 1 .docx
BA634 Current & Emerging Technology Research Paper 1  .docxBA634 Current & Emerging Technology Research Paper 1  .docx
BA634 Current & Emerging Technology Research Paper 1 .docxwilcockiris
 
ThesisProject Guidelines for Graduate Students Acknowle.docx
ThesisProject Guidelines for Graduate Students Acknowle.docxThesisProject Guidelines for Graduate Students Acknowle.docx
ThesisProject Guidelines for Graduate Students Acknowle.docxchristalgrieg
 
Ix instructions for using the templatecomment by gcu remove t
Ix instructions for using the templatecomment by gcu remove tIx instructions for using the templatecomment by gcu remove t
Ix instructions for using the templatecomment by gcu remove tRIYAN43
 
THIS PAPER IS TO BE USED AS YOUR GUIDE TO HELP YOU PUT TOGETHER TH
THIS PAPER IS TO BE USED AS YOUR GUIDE TO HELP YOU PUT TOGETHER THTHIS PAPER IS TO BE USED AS YOUR GUIDE TO HELP YOU PUT TOGETHER TH
THIS PAPER IS TO BE USED AS YOUR GUIDE TO HELP YOU PUT TOGETHER THTakishaPeck109
 
Chapter 1 IntroductionBackgroundIntroductionIn this section, .docx
Chapter 1 IntroductionBackgroundIntroductionIn this section, .docxChapter 1 IntroductionBackgroundIntroductionIn this section, .docx
Chapter 1 IntroductionBackgroundIntroductionIn this section, .docxketurahhazelhurst
 
mini thesis template APA example 6th edition AIPX[1]
mini thesis template APA example 6th edition AIPX[1]mini thesis template APA example 6th edition AIPX[1]
mini thesis template APA example 6th edition AIPX[1]Kristina Masten
 
How to write a scientific paper for publication
How to write a scientific paper for publicationHow to write a scientific paper for publication
How to write a scientific paper for publicationAnisur Rahman
 
14Dissertation ProspectusInsert Prospectus Title Sub.docx
14Dissertation ProspectusInsert Prospectus Title Sub.docx14Dissertation ProspectusInsert Prospectus Title Sub.docx
14Dissertation ProspectusInsert Prospectus Title Sub.docxaulasnilda
 
Research Report Guide A Guide for BA634 Students .docx
Research Report Guide A Guide for BA634 Students .docxResearch Report Guide A Guide for BA634 Students .docx
Research Report Guide A Guide for BA634 Students .docxgholly1
 
ResearchReport Guide Table of Contents.docx
ResearchReport Guide Table of Contents.docxResearchReport Guide Table of Contents.docx
ResearchReport Guide Table of Contents.docxronak56
 
Journal article & publishing lecture 2014
Journal article & publishing lecture 2014Journal article & publishing lecture 2014
Journal article & publishing lecture 2014Mohammed Maina
 
School of Business, Economic, and TechnologyCampbellsville U.docx
School of Business, Economic, and TechnologyCampbellsville U.docxSchool of Business, Economic, and TechnologyCampbellsville U.docx
School of Business, Economic, and TechnologyCampbellsville U.docxanhlodge
 
ENG 122 WEEK 3 - FINAL PAPER OUTLINEUse this outline templat.docx
ENG 122 WEEK 3 - FINAL PAPER OUTLINEUse this outline templat.docxENG 122 WEEK 3 - FINAL PAPER OUTLINEUse this outline templat.docx
ENG 122 WEEK 3 - FINAL PAPER OUTLINEUse this outline templat.docxpauline234567
 
Kingdom of Saudi ArabiaMinistry of EducationUniversity of Ha
Kingdom of Saudi ArabiaMinistry of EducationUniversity of HaKingdom of Saudi ArabiaMinistry of EducationUniversity of Ha
Kingdom of Saudi ArabiaMinistry of EducationUniversity of HaJospehStull43
 
ASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docx
ASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docxASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docx
ASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docxedmondpburgess27164
 
Title of the research proposal
Title of the research proposalTitle of the research proposal
Title of the research proposalElisha Bhandari
 

Similar to 13Dissertation Proposal and Dissertation Manuscript (18)

Expectations for Short Papers Leadership & EthicsIntroducti.docx
Expectations for Short Papers Leadership & EthicsIntroducti.docxExpectations for Short Papers Leadership & EthicsIntroducti.docx
Expectations for Short Papers Leadership & EthicsIntroducti.docx
 
Chapter 1 IntroductionIntroductionIn this section, present.docx
Chapter 1 IntroductionIntroductionIn this section, present.docxChapter 1 IntroductionIntroductionIn this section, present.docx
Chapter 1 IntroductionIntroductionIn this section, present.docx
 
BA634 Current & Emerging Technology Research Paper 1 .docx
BA634 Current & Emerging Technology Research Paper 1  .docxBA634 Current & Emerging Technology Research Paper 1  .docx
BA634 Current & Emerging Technology Research Paper 1 .docx
 
ThesisProject Guidelines for Graduate Students Acknowle.docx
ThesisProject Guidelines for Graduate Students Acknowle.docxThesisProject Guidelines for Graduate Students Acknowle.docx
ThesisProject Guidelines for Graduate Students Acknowle.docx
 
Ix instructions for using the templatecomment by gcu remove t
Ix instructions for using the templatecomment by gcu remove tIx instructions for using the templatecomment by gcu remove t
Ix instructions for using the templatecomment by gcu remove t
 
THIS PAPER IS TO BE USED AS YOUR GUIDE TO HELP YOU PUT TOGETHER TH
THIS PAPER IS TO BE USED AS YOUR GUIDE TO HELP YOU PUT TOGETHER THTHIS PAPER IS TO BE USED AS YOUR GUIDE TO HELP YOU PUT TOGETHER TH
THIS PAPER IS TO BE USED AS YOUR GUIDE TO HELP YOU PUT TOGETHER TH
 
Chapter 1 IntroductionBackgroundIntroductionIn this section, .docx
Chapter 1 IntroductionBackgroundIntroductionIn this section, .docxChapter 1 IntroductionBackgroundIntroductionIn this section, .docx
Chapter 1 IntroductionBackgroundIntroductionIn this section, .docx
 
mini thesis template APA example 6th edition AIPX[1]
mini thesis template APA example 6th edition AIPX[1]mini thesis template APA example 6th edition AIPX[1]
mini thesis template APA example 6th edition AIPX[1]
 
How to write a scientific paper for publication
How to write a scientific paper for publicationHow to write a scientific paper for publication
How to write a scientific paper for publication
 
14Dissertation ProspectusInsert Prospectus Title Sub.docx
14Dissertation ProspectusInsert Prospectus Title Sub.docx14Dissertation ProspectusInsert Prospectus Title Sub.docx
14Dissertation ProspectusInsert Prospectus Title Sub.docx
 
Research Report Guide A Guide for BA634 Students .docx
Research Report Guide A Guide for BA634 Students .docxResearch Report Guide A Guide for BA634 Students .docx
Research Report Guide A Guide for BA634 Students .docx
 
ResearchReport Guide Table of Contents.docx
ResearchReport Guide Table of Contents.docxResearchReport Guide Table of Contents.docx
ResearchReport Guide Table of Contents.docx
 
Journal article & publishing lecture 2014
Journal article & publishing lecture 2014Journal article & publishing lecture 2014
Journal article & publishing lecture 2014
 
School of Business, Economic, and TechnologyCampbellsville U.docx
School of Business, Economic, and TechnologyCampbellsville U.docxSchool of Business, Economic, and TechnologyCampbellsville U.docx
School of Business, Economic, and TechnologyCampbellsville U.docx
 
ENG 122 WEEK 3 - FINAL PAPER OUTLINEUse this outline templat.docx
ENG 122 WEEK 3 - FINAL PAPER OUTLINEUse this outline templat.docxENG 122 WEEK 3 - FINAL PAPER OUTLINEUse this outline templat.docx
ENG 122 WEEK 3 - FINAL PAPER OUTLINEUse this outline templat.docx
 
Kingdom of Saudi ArabiaMinistry of EducationUniversity of Ha
Kingdom of Saudi ArabiaMinistry of EducationUniversity of HaKingdom of Saudi ArabiaMinistry of EducationUniversity of Ha
Kingdom of Saudi ArabiaMinistry of EducationUniversity of Ha
 
ASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docx
ASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docxASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docx
ASSIGNMENTGM 501 Summer 2019Assignment InstructionsCho.docx
 
Title of the research proposal
Title of the research proposalTitle of the research proposal
Title of the research proposal
 

More from AnastaciaShadelb

You will submit your proposal as a text-based Word or PDF file.   
You will submit your proposal as a text-based Word or PDF file.   You will submit your proposal as a text-based Word or PDF file.   
You will submit your proposal as a text-based Word or PDF file.   AnastaciaShadelb
 
What is Family Resource Management and why is it important to t
What is Family Resource Management and why is it important to tWhat is Family Resource Management and why is it important to t
What is Family Resource Management and why is it important to tAnastaciaShadelb
 
What can you do as a teacher to manage the dynamics of diversity
What can you do as a teacher to manage the dynamics of diversityWhat can you do as a teacher to manage the dynamics of diversity
What can you do as a teacher to manage the dynamics of diversityAnastaciaShadelb
 
Week 4 APN Professional Development Plan PaperPurpose The pur
Week 4 APN Professional Development Plan PaperPurpose The purWeek 4 APN Professional Development Plan PaperPurpose The pur
Week 4 APN Professional Development Plan PaperPurpose The purAnastaciaShadelb
 
TopicTransitions of Care in Long- Term Care (LTC)Discuss C
TopicTransitions of Care in Long- Term Care (LTC)Discuss CTopicTransitions of Care in Long- Term Care (LTC)Discuss C
TopicTransitions of Care in Long- Term Care (LTC)Discuss CAnastaciaShadelb
 
Topic Hepatitis B infection Clinical Practice Presen
Topic  Hepatitis B infection         Clinical Practice PresenTopic  Hepatitis B infection         Clinical Practice Presen
Topic Hepatitis B infection Clinical Practice PresenAnastaciaShadelb
 
The Fresh Detergent CaseEnterprise Industries produces Fresh,
The Fresh Detergent CaseEnterprise Industries produces Fresh, The Fresh Detergent CaseEnterprise Industries produces Fresh,
The Fresh Detergent CaseEnterprise Industries produces Fresh, AnastaciaShadelb
 
tables, images, research tools, mail merges, and much more. Tell us
tables, images, research tools, mail merges, and much more. Tell us tables, images, research tools, mail merges, and much more. Tell us
tables, images, research tools, mail merges, and much more. Tell us AnastaciaShadelb
 
TBSB NetworkThe Best Sports Broadcasting Network is home to al
TBSB NetworkThe Best Sports Broadcasting Network is home to alTBSB NetworkThe Best Sports Broadcasting Network is home to al
TBSB NetworkThe Best Sports Broadcasting Network is home to alAnastaciaShadelb
 
Sheet1For the accounts below 1Calculate the variance, making sure
Sheet1For the accounts below 1Calculate the variance, making sure Sheet1For the accounts below 1Calculate the variance, making sure
Sheet1For the accounts below 1Calculate the variance, making sure AnastaciaShadelb
 
SU_NSG6430_week2_A2_Pandey_Rby Ram PandeySubmissi
SU_NSG6430_week2_A2_Pandey_Rby Ram PandeySubmissiSU_NSG6430_week2_A2_Pandey_Rby Ram PandeySubmissi
SU_NSG6430_week2_A2_Pandey_Rby Ram PandeySubmissiAnastaciaShadelb
 
Sheet1Risk Register for Project NameDateProject NameID No.RankRis
Sheet1Risk Register for Project NameDateProject NameID No.RankRisSheet1Risk Register for Project NameDateProject NameID No.RankRis
Sheet1Risk Register for Project NameDateProject NameID No.RankRisAnastaciaShadelb
 
12Final Project TopicFinal Project TopicI selec
12Final Project TopicFinal Project TopicI selec12Final Project TopicFinal Project TopicI selec
12Final Project TopicFinal Project TopicI selecAnastaciaShadelb
 
12Capstone ProjectOlivia TimmonsDepartment of
12Capstone ProjectOlivia TimmonsDepartment of 12Capstone ProjectOlivia TimmonsDepartment of
12Capstone ProjectOlivia TimmonsDepartment of AnastaciaShadelb
 
12First Name Last NamePlaza CollegeMGT1003 Sec
12First Name Last NamePlaza CollegeMGT1003 Sec12First Name Last NamePlaza CollegeMGT1003 Sec
12First Name Last NamePlaza CollegeMGT1003 SecAnastaciaShadelb
 
12Epic EMR ImplementationComment by Author 2 Need a
12Epic EMR ImplementationComment by Author 2 Need a 12Epic EMR ImplementationComment by Author 2 Need a
12Epic EMR ImplementationComment by Author 2 Need a AnastaciaShadelb
 
12Facebook WebsiteAdriana C. HernandezRasmussen Un
12Facebook WebsiteAdriana C. HernandezRasmussen Un12Facebook WebsiteAdriana C. HernandezRasmussen Un
12Facebook WebsiteAdriana C. HernandezRasmussen UnAnastaciaShadelb
 
12Experience During my clinical placem
12Experience During my clinical placem12Experience During my clinical placem
12Experience During my clinical placemAnastaciaShadelb
 
12Dissertation Topic ApprovalDissertation Topic App
12Dissertation Topic ApprovalDissertation Topic App12Dissertation Topic ApprovalDissertation Topic App
12Dissertation Topic ApprovalDissertation Topic AppAnastaciaShadelb
 
12Essay TitleThesis Statement I. This is the topic
12Essay TitleThesis Statement  I. This is the topic12Essay TitleThesis Statement  I. This is the topic
12Essay TitleThesis Statement I. This is the topicAnastaciaShadelb
 

More from AnastaciaShadelb (20)

You will submit your proposal as a text-based Word or PDF file.   
You will submit your proposal as a text-based Word or PDF file.   You will submit your proposal as a text-based Word or PDF file.   
You will submit your proposal as a text-based Word or PDF file.   
 
What is Family Resource Management and why is it important to t
What is Family Resource Management and why is it important to tWhat is Family Resource Management and why is it important to t
What is Family Resource Management and why is it important to t
 
What can you do as a teacher to manage the dynamics of diversity
What can you do as a teacher to manage the dynamics of diversityWhat can you do as a teacher to manage the dynamics of diversity
What can you do as a teacher to manage the dynamics of diversity
 
Week 4 APN Professional Development Plan PaperPurpose The pur
Week 4 APN Professional Development Plan PaperPurpose The purWeek 4 APN Professional Development Plan PaperPurpose The pur
Week 4 APN Professional Development Plan PaperPurpose The pur
 
TopicTransitions of Care in Long- Term Care (LTC)Discuss C
TopicTransitions of Care in Long- Term Care (LTC)Discuss CTopicTransitions of Care in Long- Term Care (LTC)Discuss C
TopicTransitions of Care in Long- Term Care (LTC)Discuss C
 
Topic Hepatitis B infection Clinical Practice Presen
Topic  Hepatitis B infection         Clinical Practice PresenTopic  Hepatitis B infection         Clinical Practice Presen
Topic Hepatitis B infection Clinical Practice Presen
 
The Fresh Detergent CaseEnterprise Industries produces Fresh,
The Fresh Detergent CaseEnterprise Industries produces Fresh, The Fresh Detergent CaseEnterprise Industries produces Fresh,
The Fresh Detergent CaseEnterprise Industries produces Fresh,
 
tables, images, research tools, mail merges, and much more. Tell us
tables, images, research tools, mail merges, and much more. Tell us tables, images, research tools, mail merges, and much more. Tell us
tables, images, research tools, mail merges, and much more. Tell us
 
TBSB NetworkThe Best Sports Broadcasting Network is home to al
TBSB NetworkThe Best Sports Broadcasting Network is home to alTBSB NetworkThe Best Sports Broadcasting Network is home to al
TBSB NetworkThe Best Sports Broadcasting Network is home to al
 
Sheet1For the accounts below 1Calculate the variance, making sure
Sheet1For the accounts below 1Calculate the variance, making sure Sheet1For the accounts below 1Calculate the variance, making sure
Sheet1For the accounts below 1Calculate the variance, making sure
 
SU_NSG6430_week2_A2_Pandey_Rby Ram PandeySubmissi
SU_NSG6430_week2_A2_Pandey_Rby Ram PandeySubmissiSU_NSG6430_week2_A2_Pandey_Rby Ram PandeySubmissi
SU_NSG6430_week2_A2_Pandey_Rby Ram PandeySubmissi
 
Sheet1Risk Register for Project NameDateProject NameID No.RankRis
Sheet1Risk Register for Project NameDateProject NameID No.RankRisSheet1Risk Register for Project NameDateProject NameID No.RankRis
Sheet1Risk Register for Project NameDateProject NameID No.RankRis
 
12Final Project TopicFinal Project TopicI selec
12Final Project TopicFinal Project TopicI selec12Final Project TopicFinal Project TopicI selec
12Final Project TopicFinal Project TopicI selec
 
12Capstone ProjectOlivia TimmonsDepartment of
12Capstone ProjectOlivia TimmonsDepartment of 12Capstone ProjectOlivia TimmonsDepartment of
12Capstone ProjectOlivia TimmonsDepartment of
 
12First Name Last NamePlaza CollegeMGT1003 Sec
12First Name Last NamePlaza CollegeMGT1003 Sec12First Name Last NamePlaza CollegeMGT1003 Sec
12First Name Last NamePlaza CollegeMGT1003 Sec
 
12Epic EMR ImplementationComment by Author 2 Need a
12Epic EMR ImplementationComment by Author 2 Need a 12Epic EMR ImplementationComment by Author 2 Need a
12Epic EMR ImplementationComment by Author 2 Need a
 
12Facebook WebsiteAdriana C. HernandezRasmussen Un
12Facebook WebsiteAdriana C. HernandezRasmussen Un12Facebook WebsiteAdriana C. HernandezRasmussen Un
12Facebook WebsiteAdriana C. HernandezRasmussen Un
 
12Experience During my clinical placem
12Experience During my clinical placem12Experience During my clinical placem
12Experience During my clinical placem
 
12Dissertation Topic ApprovalDissertation Topic App
12Dissertation Topic ApprovalDissertation Topic App12Dissertation Topic ApprovalDissertation Topic App
12Dissertation Topic ApprovalDissertation Topic App
 
12Essay TitleThesis Statement I. This is the topic
12Essay TitleThesis Statement  I. This is the topic12Essay TitleThesis Statement  I. This is the topic
12Essay TitleThesis Statement I. This is the topic
 

Recently uploaded

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

13Dissertation Proposal and Dissertation Manuscript

  • 1. 13 Dissertation Proposal and Dissertation Manuscript Template and Guide This cover page and template instructional content should be removed before drafting chapters. Keep the template instructions in a separate location for ongoing reference as you develop chapter content within the manuscript format. Instructions for how to use this template and guide: · Type directly into the template at “Begin writing here...” or “Text…”. Doing so should help to ensure the document is properly formatted. · Use reminders in the comments relating to formatting as well as helpful tips for guidance purposes. Additionally, in each main section, use the checklist relating to content so you know what to include before you begin to organize your thoughts. Refer to the checklist continuously as you develop each section. As you self-evaluate each section, you can actually check off each box by clicking on it to ensure you have met all the requirements. Please note these lists are resources and not meant to be exhaustive, as it is impossible to cover the details of every method and design. · The length of a section can vary, unless a guideline is provided. · Once you have developed each section, refer to the comments and checklists one last time to be sure the section matches them as discussed with your Chair, then delete them.
  • 2. · To delete a comment, right click on the comment, then select “Delete Comment.”. For additional strategies and guidance, click here. Version: October 2020 © Northcentral University, 2020 Comment by Northcentral University: Ensure every section in the document meets the following requirements: ☐ Use 12-point and Times New Roman font. ☐ Write in the future tense when referencing the proposed study in the dissertation proposal. Write in the past tense when referencing the completed study in the dissertation manuscript. ☐ Use economy of expression to present information as succinctly as possible without oversimplifying or losing the meaning. ☐ Avoid personal opinions and claims. ☐ Support all claims in the document with recent, scholarly, peer-reviewed sources published within 5 years of when the dissertation will be completed, unless they are seminal sources or no other literature exists. For additional information and guidance relating to scholarly and peer-reviewed sources, click here. ☐ Avoid anthropomorphism (i.e., giving human qualities to inanimate objects) such as “The article claims…”, “The study found…,”, or “The research explored…”. ☐ Clearly and precisely define key words upon their first use only. Title of the Dissertation Comment by Northcentral University:
  • 3. With the exception of articles and prepositions, the first letter of each word should be capitalized. The title should be two single spaces (one double space) from the top of the page. In 10-15 words, it should indicate the contents of the study. The title should be bold. The title page should include no page number, so please recheck pagination once the template cover page has been removed. Dissertation Proposal Submitted to Northcentral University School of Business Administration in Partial Fulfillment of the Requirements for the Degree of DOCTOR OFMANAGEMENT INFORMATION SYSTEMS by RAHKON ALLAH ROSS
  • 4. La Jolla, California October 2021 Abstract Comment by Northcentral University: The abstract should be included in the dissertation manuscript only. It should not be included in the dissertation proposal. The word Abstract should be centered, bolded, and begin on its own page. Begin Multiple cybersecurity threats are faced by small business owners and ransomware is one of them as it denies access of small business owners to their data in exchange for a specific payment. The purpose of this qualitative case study is to better understand the impediments to the application of ransomware specific preventative, detective, and corrective controls by small business owners. The leaders and managers working in small businesses can get potential benefits by applying specific strategies and themes for the prevention of victimization. It will bring a positive change in society by not only supporting the local economy but also reduce the spread of ransomware for the protection of sensitive and confidential consumer data. Comment by Northcentral University: The text should be left-justified (not indented) and double-spaced with
  • 5. no breaks. Acknowledgements Comment by Northcentral University: You may include an optional acknowledgements page in normal paragraph format in the dissertation manuscript. Do not incl ude such a page in the dissertation proposal. The word Acknowledgements should be centered, bolded, and begin on its own page. Begin writing here… Table of Contents Comment by Northcentral University: Use the Table of Contents feature in Word. For additional information on creating a table of contents, click here. For information on updating the table of contents, click here, and for video resources from the Academic Success Center on formatting the table of contents, click here. Do not manually add headings into the Table of Contents. The headings in the table of contents are populated from the Styles gallery using the APA Level 1 and Heading 2 styles. Only include APA heading levels 1 and 2 in the table of contents. Use the Heading 2 style from the Styles gallery to add level two headings in the document. Update the table of contents to reflect any new level 2 headings added to document. Comment by Northcentral University: For Academic Success Center resources on formatting the table of contents, click here. For assistance, use the videos in the Tables and Headers tab and handouts in the Format tab. Comment by Northcentral University: Ensure the headings in the table of contents match those in the document. Please note the place holders are included in this table of contents: “XXX” under Chapter 2 must be replaced with the themes generated from the integrative critical review of the literature.
  • 6. If your study is qualitative, “Operational Definitions of Variables” under Chapter 3 must be deleted. “XXX” under Chapter 4 must be replaced with “Trustworthiness” for a qualitative study, “Validity and Reliability” for a quantitative study, and “Trustworthiness/Validity and Reliability” for a mixed methods study. The number of research questions listed under Chapter 4 must align with the number of research questions in your study. Under Appendices, each “XXX” must be replaced with the titles of the appendix. Chapter 1: Introduction1 Statement of the Problem2 Purpose of the Study2 Introduction to Theoretical or Conceptual Framework 3 Introduction to Research Methodology and Design4 Research Questions4 Hypotheses4 Significance of the Study5 Definitions of Key Terms6 Summary6 Chapter 2: Literature Review7 Theoretical or Conceptual Framework 7 Subtopic8 Summary8 Chapter 3: Research Method10 Research Methodology and Design10 Population and Sample10 Materials or Instrumentation11 Operational Definitions of Variables 12 Study Procedures13 Data Analysis13 Assumptions 14
  • 7. Limitations14 Delimitations14 Ethical Assurances15 Summary15 Chapter 4: Findings16 XXX of the Data16 Results17 Evaluation of the Findings18 Summary18 Chapter 5: Implications, Recommendations, and Conclusions19 Implications19 Recommendations for Practice20 Recommendations for Future Research20 Conclusions20 References22 Appendix A XXX23 Appendix B XXX24 List of Tables Comment by Northcentral University: The words List of Tables should be centered, bolded, and begin on its own page Use the Table of Figures feature in Word and select “Table” as the caption label. For additional information and guidance, click here. Tip: For formatting the caption for tables, table headings should be double spaced and placed above the table. The word “Table” and the number should be bolded. The table title is in title case and italics. Comment by Northcentral University: Click here to review a video from the Academic Success Center on creating the List of Tables. Begin list of tables here… Content will be provided once study has started.
  • 8. List of Figures Comment by Northcentral University: The words List of Figures should be centered, bolded, and begin on its own page Use the Table of Figures feature in Word and select “Figure” as the caption label. For additional information and guidance, click here. Tip: For formatting the caption for figures, figure headings should be double spaced and placed above the figure. The word “Figure” and the number should be bolded. The figure title is in title case and italics. Comment by Northcentral University: Click here to review a video on creating the List of Figures. Begin list of figures here…Content will be provided once study has started. 1 viChapter 1: Introduction Comment by Garrett Smiley: Requirements have not been met (see highlighted areas below). Delete the text highlighted in yellow, as it is either incorrect or unnecessary for this section. Rewrite this entire section as a lead up or a ramp up to the problem statement; it should should serve as both a introduction to the problem space with background on what the academic body of knowledge has to has about the current state of the problem space. All claims must have a citation from a current, peer reviewed journal article (this is true for any claim made in
  • 9. the paper). Checklist: ☐ Begin with an overview of the general topic to establish the context of the study and orient the reader to the field. Do not overstate the topic as you will address the topic more fully in Chapter 2. ☐ Describe the larger context in which the problem exists. ☐ Present an overview of why this research topic is relevant and warranted. ☐ Briefly explain what research has been done on the topic and why the topic is important practically and empirically (applied and PhD) as well as theoretically (PhD). ☐ Clearly lead the reader to the problem statement to follow. The reader should not be surprised by the problem described later in the document. ☐ Do not explicitly state the study problem, purpose, or methodology, as they are discussed in subsequent sections. ☐ Devote approximately 2 to 4 pages to this section. ☐ Write in the future tense when referencing the proposed study in the dissertation proposal. Write in the past tense when referencing the completed study in the dissertation manuscript. ☐ There are no personal opinions in the dissertation. All work must come from cited sources. Multiple cybersecurity threats are faced by small business owners and ransomware is one of them as it denies access of small business owners to their data in exchange for a specific payment. The purpose of this qualitative case study is to better understand the impediments to the application of ransomware specific preventative, detective, and corrective controls by small business owners. The leaders and managers working in small businesses can get potential benefits by applying specific strategies and themes for the prevention of victimization. It will bring a positive change in society by not only supporting the local economy but also reduce the spread of ransomware for the
  • 10. protection of sensitive and confidential consumer data. Statement of the Problem Comment by Garrett Smiley: Requirements have not been met (see highlighted areas below). Add a statement that identifies what is unknown about this problem that should be known. Add a statement about the potential negative consequences if the proposed study is not performed by the researcher. Checklist: ☐ Begin with “The problem to be addressed in this study is…” This statement should logically flow from the introduction and clearly identify the problem to be addressed by the study (current citations needed). ☐ Succinctly discuss the problem and provide evidence of its existence.
  • 11. ☐ Identify who is impacted by the problem (e.g., individuals, organizations, industries, or society), what is not known that should be known about it, and what the potential negative consequences could be if the problem is not addressed in this study. ☐ Ensure the concepts presented are exactly the same as those mentioned in the Purpose Statement section. ☐ Do not exceed 250-300 words. The problem addressed in this study is ransomware is continuing to wreak havoc since its' discovery over twenty years ago (Dhinnesh, 2020). Small businesses continue to be regularly attacked through the use of ransomware (Poudyal & Dasgupta, 2021). Purpose of the Study Comment by Garrett Smiley:
  • 12. Requirements have not been met (see highlighted areas below). Include a step by step overview of how the study will be conducted. Identify the population. Identify the minimum sample size and justify it using proper citations. Identify how the researcher will have access to data (e.g., paid services through ServiceMonkey, Qualtrics). Checklist: ☒ Begin with a succinct purpose statement that identifies the study method, design, and overarching goal. The recommended language to use is: “The purpose of this [identify research methodology] [identify research design] study is to [identify the goal of the dissertation that directly reflects and encompasses the research questions to follow].” ☐ Indicate how the study is a logical, explicit research response to the stated problem and the research questions to follow. ☐ Continue with a brief but clear step-by-step overview of how the study will be (proposal) or was (manuscript) conducted. ☐ Identify the variables/constructs, materials/instrumentation, and analysis. ☐ For the proposal (DP) identify the target population and sample size needed. For the manuscript (DM), edit and list sample size obtained. ☐ Identify the site(s) where the research will be (proposal) or was (manuscript) conducted using general geographic terms to avoid identifying the specific location. To avoid compromising participants’ confidentiality or anonymity, use pseudonyms. ☐ Do not exceed one paragraph or one page. The purpose of this qualitative case study is to better
  • 13. understand the impediments for the application of ransomware specific preventative, detective, and corrective controls by small business owners. Introduction to Theoretical or Conceptual Framework Comment by Garrett Smiley: Requirements have been met. Checklist: ☐ Identify the guiding framework. Present the key concepts, briefly explain how they are related, and present the propositions relevant to this study. ☐ Explain how the framework guided the research decisions, including the development of the problem statement, purpose statement, and research questions.
  • 14. ☐ If more than one framework is guiding the study, integrate them, rather than describing them independently. Do not select a separate framework for each variable/construct under examination. ☐ Do not exceed two pages. A more thorough discussion of the theoretical/conceptual framework will be included in Chapter 2. The theoretical framework is used to explain this study is known as the routine activity theory that was introduced by Cohen and Felson in 1979 (Holt et al., 2020). This framework is most appropriate in the given study because it shows how having effective protection of systems against ransomware can offer prevention of infections. This is a criminology theory that is based on examining the victimization and offences of cybercrime (de Melo et al., 2018). It will help in understanding the application of ransomware and for the development of controls including preventive, corrective and detective controls. Introduction to Research Methodology and Design Comment by Garrett Smiley: Requirements have not been met (see highlighted areas below). Delete the text highlighted in yellow, as it is either incorrect or unnecessary for this section. Rewrite this entire section to justify the selection of the research methodology (i.e., qualitative) and research design (i.e., case study). Define and justify these selections using
  • 15. proper citations. Checklist: ☐ Provide a brief discussion of the methodology and design to include a description of the data collection procedure and analysis. Do not include specific details regarding why the methodology and design were selected over others. More detailed information will be included in Chapter 3. ☐ Cite the seminal works related to the selected methodology and design. ☐ Indicate why the selected research methodology and design are the best choices for the study by explaining how they align with the problem and purpose statements as well as the research questions. Do not simply list and describe various research methodologies and designs. ☐ Devote approximately one to two pages to this section. This is a qualitative study in which the collection of mixed - method will be used for selecting numerous designs of case studies so that effective study of small businesses will offer better control strategies in addressing the issue of ransomware. The design takes into account multiple small businesses for interviewing that have effective control strategies (Malecki, 2019). These interviews are ultimately very helpful in understanding the market dynamics and ways of preventing, correcting and detecting ransomware in small businesses (Tuttle, 2020). Research Questions Comment by Garrett Smiley: Requirements have been met. Checklist:
  • 16. ☐ Present research questions directly answerable, specific, and testable within the given timeframe and location identified in the problem and purpose statements. ☐ Include the exact same variables/constructs, participants, and location mentioned in the problem and purpose statements. No new variables/constructs should be introduced. RQ1 What are the impediments for the application of ransomware specific preventative controls by small business owners? RQ2What are the impediments for the application of ransomware specific detective controls by small business owners? RQ3 What are the impediments for the application of ransomware specific corrective controls by small business owners?Significance of the Study Comment by Garrett Smiley: Requirements have not been met (see highlighted areas below). Provide citations for all of the claims in this section. Checklist: ☐ Describe why the study is important and how it can contribute to the field of study. ☐ For applied studies, explain how the results might both be significant to leaders and practitioners in the field and contribute to the literature. For PhD studies, explain how the results advance the guiding framework and contribute to the literature. ☐ Describe the benefits of addressing the study problem,
  • 17. achieving the study purpose, and answering the research questions. Whereas the problem statement should articulate the negative consequences of not conducting the study, this section should highlight the positive consequences of completing the study. ☐ Do not exceed one page. The significance of this study states that it can contribute a lot towards helping small business owners to become more informed regarding the implications of controls relating to cyber security so that they can improve business operations. Most of the time, small business owners are not informed about the magnitude of ransomware threats. Some business owners can learn through experience how to strengthe n and mitigate their cyber security while reducing the negative consequences of ransomware attacks. Most of the time, small business owners provide information to promote stability and safety while being in their locus of control and managing all cost-effectively. There is a more sophisticated type of information system being used in large businesses compared to small companies, which can help improve the strategies of small companies and adjust them according to the target company. This means that it is necessary to understand complex information systems and also improve subcomponents for better implementation. Definitions of Key Terms Comment by Garrett Smiley: Requirements have not been met (see highlighted areas below). Alphabetize the terms. Separate the final term into two terms. Checklist: ☐ Alphabetize and bold terms directly related to the dissertation topic and not commonly used or understood. ☐ Paraphrase the definitions of the terms using complete sentences and provide a citation for each one.
  • 18. ☐ Do not define theories, conceptual frameworks, statistical analyses, methodological terms, or the variables/constructs under examination. Term 1 Ransomware: Ransomware is a type of online virus that is used for getting money from victims (Young & Yung, 2017). Term 2 Guardianship: Guardianship is the concept of protection in which the elements of surveillance are used for getting prevention from crime (Young & Yung, 2017). Term 3 Detective controls: Detective controls are the controls that are used for detecting ransomware any kind of online virus that can be harmful to the information system (Williams et al, 2020). Term 4 Preventive and corrective controls: Preventive and corrective controls are helpful in not only developing preventive strategies but also having a proper corrective system to overcome the issue in case of any cyber-attack (Williams et al, 2020). Summary Comment by Garrett Smiley: Requirements have been met. Checklist: ☐ Briefly restate the key points discussed in the chapter. Review the headings and/or table of contents to ensure all key points are covered. The problem addressed in this study is ransomware is continuing to wreak havoc since its' discovery over twenty years ago (Dhinnesh, 2020). Small businesses continue to be regul arly attacked through the use of ransomware (Poudyal & Dasgupta, 2021). The purpose of this qualitative case study is to better
  • 19. understand the impediments to the application of ransomware- specific preventative, detective, and corrective controls by small business owners. The theoretical framework used to explain this study is known as the routine activity theory introduced by Cohen and Felson in 1979 (Holt et al., 2020). This framework is most appropriate in the given study because it shows how having adequate protection of systems against ransomware can offer prevention of infections. This study is very significant in identifying the usefulness of developing preventive and control strategies against ransomware. Most of the time, small business owners are not informed about the magnitude of ransomware threats. Some business owners can learn through experience how to strengthen and mitigate their cyber security while reducing the negative consequences of ransomware attacks. This study will provide help to smal l business owners in overcoming these issues and protecting their data. Chapter 2: Literature Review Comment by Garrett Smiley: Section missing: Introduction Requirements have not been met (see highlighted areas below). Checklist: ☐ Begin with the first sentence of the purpose statement and problem statement that leads to a brief explanation of the organization of the literature review. Do not simply cut and paste the Purpose Statement section from Chapter 1. ☐ Provide an overview of the sub-headings in the literature that will be discussed. ☐ At the end of this section, indicate the databases accessed and the search engines used. Discuss all the search parameters, including the search terms and their combinations (with more detailed search terms located in an appendix, if appropriate), range of years, and types of literature. ☐ Devote approximately 30 to 60 pages to this chapter to include citations to at least 50 relevant sources.
  • 20. Begin writing here… Checklist: ☐ Begin with the first sentence of the purpose statement and problem statement that leads to a brief explanation of the organization of the literature review. Do not simply cut and paste the Purpose Statement section from Chapter 1. ☐ Provide an overview of the sub-headings in the literature that will be discussed. ☐ At the end of this section, indicate the databases accessed and the search engines used. Discuss all the search parameters, including the search terms and their combinations (with more detailed search terms located in an appendix, if appropriate), range of years, and types of literature. ☐ Devote approximately 30 to 60 pages to this chapter to include citations to at least 50 relevant sources.Theoretical or Conceptual Framework Comment by Garrett Smiley: Section missing: Theoretical or Conceptual Framework Requirements have not been met (see highlighted areas below). Checklist: ☐ Describe the guiding theoretical/conceptual framework of the study, including the definitions of all the concepts, an explanation of the relationships among the concepts, and a presentation of all the assumptions and propositions. ☐ Explain the origin and development of the framework. Demonstrate detailed knowledge of and familiarity with both the historical and the current literature on the framework. ☐ Identify existing research studies that used this framework in a similar way. Mention alternative frameworks, with a justification of why the selected framework was chosen. ☐ Describe how and why the selected framework relates to the present study and how it guided the development of the problem statement, purpose statement, and research questions. Begin writing here…
  • 21. Checklist: ☐ Describe the guiding theoretical/conceptual framework of the study, including the definitions of all the concepts, an explanation of the relationships among the concepts, and a presentation of all the assumptions and propositions. ☐ Explain the origin and development of the framework. Demonstrate detailed knowledge of and familiarity with both the historical and the current literature on the framework. ☐ Identify existing research studies that used this framework in a similar way. Mention alternative frameworks, with a justification of why the selected framework was chosen. ☐ Describe how and why the selected framework relates to the present study and how it guided the development of the problem statement, purpose statement, and research questions. Subtopic Comment by Garrett Smiley: Section missing: Subtopic Requirements have not been met (see highlighted areas below). Checklist: ☐ Critically analyze (i.e., note the strengths and weaknesses) and synthesize (i.e., integrate) the existing research. Rather than reporting on each study independently, describe everything known on the topic by reviewing the entire body of work. ☐ Present a balanced integrative critical review of the literature, ensuring all points of view are included. Cover all the important issues with a discussion of areas of convergence (i.e., agreement) and divergence (i.e., disagreement). Provide potential explanations for areas of divergence. ☐ Address issues of authority, audience, and/or bias/point of view in the sources used. Begin writing here… Level 3 Heading Text... Level 4 Heading. Text...
  • 22. Checklist: ☐ Critically analyze (i.e., note the strengths and weaknesses) and synthesize (i.e., integrate) the existing research. Rather than reporting on each study independently, describe everything known on the topic by reviewing the entire body of work. ☐ Present a balanced integrative critical review of the literature, ensuring all points of view are included. Cover all the important issues with a discussion of areas of convergence (i.e., agreement) and divergence (i.e., disagreement). Provide potential explanations for areas of divergence. ☐ Address issues of authority, audience, and/or bias/point of view in the sources used. Table 1. Summary of Selected X Studies Study Methodology Sample Instruments/Constructs Main findings or contribution Insert Citation here Insert Methodology Here Insert Sample Here Insert Instruments/Constructs Here Insert Summary Here. Insert Citation here Insert Methodology Here Insert Sample Here Insert Instruments/Constructs Here Insert Summary Here. Summary Comment by Garrett Smiley: Section missing: Summary Requirements have not been met (see highlighted areas below). Checklist: ☐ Briefly restate the key points discussed in the chapter.
  • 23. Review the headings and/or table of contents to ensure all key points are covered. ☐ Highlight areas of convergence and divergence as wel l as gaps in the literature that support the need for the study. This discussion should logically lead to Chapter 3, where the research methodology and design will be discussed. Begin writing here… Checklist: ☐ Briefly restate the key points discussed in the chapter. Review the headings and/or table of contents to ensure all key points are covered. ☐ Highlight areas of convergence and divergence as well as gaps in the literature that support the need for the study. This discussion should logically lead to Chapter 3, where the research methodology and design will be discussed. Chapter 3: Research Method Comment by Garrett Smiley: Section missing: Introduction Requirements have not been met (see highlighted areas below). Checklist: ☐ Begin with an introduction and restatement of the problem and purpose sentences verbatim. ☐ Provide a brief overview of the contents of this chapter, including a statement that identifies the research methodology and design. Begin writing here… Checklist: ☐ Begin with an introduction and restatement of the problem and purpose sentences verbatim. ☐ Provide a brief overview of the contents of this chapter, including a statement that identifies the research methodology and design.Research Methodology and Design Comment by Garrett Smiley: Section missing: Research Methodology and Design
  • 24. Requirements have not been met (see highlighted areas below). Checklist: ☐ Describe the research methodology and design. Elaborate upon their appropriateness in relation to the study problem, purpose, and research questions. ☐ Identify alternative methodologies and designs and indicate why they were determined to be less appropriate than the ones selected. Do not simply list and describe research methodologies and designs in general. Begin writing here… Checklist: ☐ Describe the research methodology and design. Elaborate upon their appropriateness in relation to the study problem, purpose, and research questions. ☐ Identify alternative methodologies and designs and indicate why they were determined to be less appropriate than the ones selected. Do not simply list and describe research methodologies and designs in general. Population and Sample Comment by Garrett Smiley: Section missing: Population and Sample Requirements have not been met (see highlighted areas below). Checklist: ☐ Describe the population, including the estimated size and relevant characteristics. ☐ Explain why the population is appropriate, given the study problem, purpose, and research questions. ☐ Describe the sample that will be (proposal) or was (manuscript) obtained. ☐ Explain why the sample is appropriate, given the study problem, purpose, and research questions.
  • 25. ☐ Explain the type of sampling used and why it is appropriate for the dissertation proposal methodology and design. For qualitative studies, evidence must be presented that saturation will be (proposal) or was (manuscript) reached. For quantitative studies, a power analysis must be reported to include the parameters (e.g., effect size, alpha, beta, and number of groups) included, and evidence must be presented that the minimum required sample size will be (proposal) or was (manuscript) reached. ☐ Describe how the participants will be (proposal) or were (manuscript) recruited (e.g., email lists from professional organizations, flyers) and/or the data will be (proposal) or were (manuscript) obtained (e.g., archived data, public records) with sufficient detail so the study could be replicated. Begin writing here… Checklist: ☐ Describe the population, including the estimated size and relevant characteristics. ☐ Explain why the population is appropriate, given the study problem, purpose, and research questions. ☐ Describe the sample that will be (proposal) or was (manuscript) obtained. ☐ Explain why the sample is appropriate, given the study problem, purpose, and research questions. ☐ Explain the type of sampling used and why it is appropriate for the dissertation proposal methodology and design. For qualitative studies, evidence must be presented that saturation will be (proposal) or was (manuscript) reached. For quantitative studies, a power analysis must be reported to include the parameters (e.g., effect size, alpha, beta, and number of groups) included, and evidence must be presented that the minimum required sample size will be (proposal) or was (manuscript) reached. ☐ Describe how the participants will be (proposal) or were (manuscript) recruited (e.g., email lists from professional organizations, flyers) and/or the data will be (proposal) or were
  • 26. (manuscript) obtained (e.g., archived data, public records) with sufficient detail so the study could be replicated. Materials or Instrumentation Comment by Garrett Smiley: Section missing: Materials or Instrumentation Requirements have not been met (see highlighted areas below). Checklist: ☐ Describe the instruments (e.g., tests, questionnaires, observation protocols) that will be (proposal) or were (manuscript) used, including information on their origin and evidence of their reliability and validity. OR as appli cable, describe the materials to be used (e.g., lesson plans for interventions, webinars, or archived data, etc.). ☐ Describe in detail any field testing or pilot testing of instruments to include their results and any subsequent modifications. ☐ If instruments or materials are used that were developed by another researcher, include evidence in the appendix that permission was granted to use the instrument(s) and/or material(s) and refer to that fact and the appendix in this section. Begin writing here… Checklist: ☐ Describe the instruments (e.g., tests, questionnaires, observation protocols) that will be (proposal) or were (manuscript) used, including information on their origin and evidence of their reliability and validity. OR as applicable, describe the materials to be used (e.g., lesson plans for interventions, webinars, or archived data, etc.). ☐ Describe in detail any field testing or pilot testing of instruments to include their results and any subsequent modifications. ☐ If instruments or materials are used that were developed by another researcher, include evidence in the appendix that
  • 27. permission was granted to use the instrument(s) and/or material(s) and refer to that fact and the appendix in this section.Operational Definitions of Variables Comment by Garrett Smiley: Section missing: Operational Definitions of Variables Requirements have not been met (see highlighted areas below). Checklist: ☐ For quantitative and mixed methods studies, identify how each variable will be (proposal) or was (manuscript) used in the study. Use terminology appropriate for the selected statistical test (e.g., independent/dependent, predictor/criterion, mediator, moderator). ☐ Base the operational definitions on published research and valid and reliable instruments. ☐ Identify the specific instrument that will be (proposal) or was (manuscript) used to measure each variable. ☐ Describe the level of measurement of each variable (e.g., nominal, ordinal, interval, ratio), potential scores for each variable (e.g., the range [0–100] or levels [low, medium, high]), and data sources. If appropriate, identify what specific scores (e.g., subscale scores, total scores) will be (proposal) or were (manuscript) included in the analysis and how they will be (proposal) or were (manuscript) derived (e.g., calculating the sum, difference, average). Begin writing here... XXX Text… Checklist: ☐ For quantitative and mixed methods studies, identify how each variable will be (proposal) or was (manuscript) used in the study. Use terminology appropriate for the selected statistical test (e.g., independent/dependent, predictor/criterion, mediator,
  • 28. moderator). ☐ Base the operational definitions on published research and valid and reliable instruments. ☐ Identify the specific instrument that will be (proposal) or was (manuscript) used to measure each variable. ☐ Describe the level of measurement of each variable (e.g., nominal, ordinal, interval, ratio), potential scores for each variable (e.g., the range [0–100] or levels [low, medium, high]), and data sources. If appropriate, identify what specific scores (e.g., subscale scores, total scores) will be (proposal) or were (manuscript) included in the analysis and how they will be (proposal) or were (manuscript) derived (e.g., calculating the sum, difference, average). Study Procedures Comment by Garrett Smiley: Section missing: Study Procedures Requirements have not been met (see highlighted areas below). Checklist: ☐ Describe the exact steps that will be (proposal) or were (manuscript) followed to collect the data, addressing what data as well as how, when, from where, and from whom those data will be (proposal) or were (manuscript) collected in enough detail the study can be replicated. Begin writing here… Checklist: ☐ Describe the exact steps that will be (proposal) or were (manuscript) followed to collect the data, addressing what data as well as how, when, from where, and from whom those data will be (proposal) or were (manuscript) collected in enough detail the study can be replicated. Data Analysis Comment by Garrett Smiley: Section missing: Data Analysis Requirements have not been met (see highlighted areas below). Checklist:
  • 29. ☐ Describe the strategies that will be (proposal) or were (manuscript) used to code and/or analyze the data, and any software that will be (proposal) or was (manuscript) used. ☐ Ensure the data that will be (proposal) or were (manuscript) analyzed can be used to answer the research questions and/or test the hypotheses with the ultimate goal of addressing the identified problem. ☐ Use proper terminology in association with each design/analysis (e.g., independent variable and dependent variable for an experimental design, predictor and criterion variables for regression). ☐ For quantitative studies, describe the analysis that will be (proposal) or was (manuscript) used to test each hypothesis. Provide evidence the statistical test chosen is appropriate to test the hypotheses and the data meet the assumptions of the statistical tests. ☐ For qualitative studies, describe how the data will be (proposal) or were (manuscript) processed and analyzed, including any triangulation efforts. Explain the role of the researcher. ☐ For mixed methods studies, include all of the above. Begin writing here… Checklist: ☐ Describe the strategies that will be (proposal) or were (manuscript) used to code and/or analyze the data, and any software that will be (proposal) or was (manuscript) used. ☐ Ensure the data that will be (proposal) or were (manuscript) analyzed can be used to answer the research questions and/or test the hypotheses with the ultimate goal of addressing the identified problem. ☐ Use proper terminology in association with each design/analysis (e.g., independent variable and dependent variable for an experimental design, predictor and criterion variables for regression). ☐For quantitative studies, describe the analysis that will be
  • 30. (proposal) or was (manuscript) used to test each hypothesis. Provide evidence the statistical test chosen is appropriate to test the hypotheses and the data meet the assumptions of the statistical tests. ☐For qualitative studies, describe how the data will be (proposal) or were (manuscript) processed and analyzed, including any triangulation efforts. Explain the role of the researcher. ☐For mixed methods studies, include all of the above.Assumptions Comment by Garrett Smiley: Section missing: Assumptions Requirements have not been met (see highlighted areas below). Checklist: ☐ Discuss the assumptions along with the corresponding rationale underlying them. Begin writing here… Checklist: ☐ Discuss the assumptions along with the corresponding rationale underlying them. Limitations Comment by Garrett Smiley: Section missing: Limitations Requirements have not been met (see highlighted areas below). Checklist: ☐ Describe the study limitations. ☐ Discuss the measures taken to mitigate these limitations. Begin writing here… Checklist: ☐ Describe the study limitations. ☐ Discuss the measures taken to mitigate these limitations. Delimitations Comment by Garrett Smiley: Section missing: Delimitations
  • 31. Requirements have not been met (see highlighted areas below). Checklist: ☐ Describe the study delimitations along with the corresponding rationale underlying them. An example of delimitations are the conditions and parameters set intentionally by the researcher or by selection of the population and sample. ☐ Explain how these research decisions relate to the existing literature and theoretical/conceptual framework, problem statement, purpose statement, and research questions. Begin writing here… Checklist: ☐ Describe the study delimitations along with the corresponding rationale underlying them. An example of delimitations are the conditions and parameters set intentionally by the researcher or by selection of the population and sample. ☐ Explain how these research decisions relate to the existing literature and theoretical/conceptual framework, problem statement, purpose statement, and research questions. Ethical Assurances Comment by Garrett Smiley: Section missing: Ethical Assurances Requirements have not been met (see highlighted areas below). Checklist: ☐ Confirm in a statement the study will (proposal) or did (manuscript) receive approval from Northcentral University’s Institutional Review Board (IRB) prior to data collection. ☐ If the risk to participants is greater than minimal, discuss the relevant ethical issues and how they will be (proposal) or were (manuscript) addressed. ☐ Describe how confidentiality or anonymity will be (proposal) or was (manuscript) achieved.
  • 32. ☐ Identify how the data will be (proposal) or were (manuscript) securely stored in accordance with IRB requirements. ☐ Describe the role of the researcher in the study. Discuss relevant issues, including biases as well as personal and professional experiences with the topic, problem, or context. Present the strategies that will be (proposal) or were (manuscript) used to prevent these biases and experiences from influencing the analysis or findings. ☐ In the dissertation manuscript only, include the IRB approval letter in an appendix. Begin writing here… Checklist: ☐ Confirm in a statement the study will (proposal) or did (manuscript) receive approval from Northcentral University’s Institutional Review Board (IRB) prior to data collection. ☐ If the risk to participants is greater than minimal, discuss the relevant ethical issues and how they will be (proposal) or were (manuscript) addressed. ☐ Describe how confidentiality or anonymity will be (proposal) or was (manuscript) achieved. ☐ Identify how the data will be (proposal) or were (manuscript) securely stored in accordance with IRB requirements. ☐ Describe the role of the researcher in the study. Discuss relevant issues, including biases as well as personal and professional experiences with the topic, problem, or context. Present the strategies that will be (proposal) or were (manuscript) used to prevent these biases and experiences from influencing the analysis or findings. ☐ In the dissertation manuscript only, include the IRB approval letter in an appendix.Summary Comment by Garrett Smiley: Section missing: Summary Requirements have not been met (see highlighted areas below). Checklist:
  • 33. ☐ Summarize the key points presented in the chapter. ☐ Logically lead the reader to the next chapter on the findings of the study. Begin writing here… Checklist: ☐ Summarize the key points presented in the chapter. ☐ Logically lead the reader to the next chapter on the findings of the study. Chapter 4: Findings Comment by Garrett Smiley: Section missing: Introduction Requirements have not been met (see highlighted areas below). Checklist: ☐ Begin with an introduction and restatement of the problem and purpose sentences verbatim and the organization of the chapter. ☐ Organize the entire chapter around the research questions/hypotheses. Begin writing here… Checklist: ☐ Begin with an introduction and restatement of the problem and purpose sentences verbatim and the organization of the chapter. ☐ Organize the entire chapter around the research questions/hypotheses. Trustworthiness/Validity and Reliability of the Data Comment by Garrett Smiley: Section missing: Trustworthiness/Validity and Reliability of the Data Requirements have not been met (see highlighted areas below) . Checklist: ☐ For qualitative studies, clearly identify the means by which the trustworthiness of the data was established. Discuss
  • 34. credibility (e.g., triangulation, member checks), transferability (e.g., the extent to which the findings are generalizable to other situations), dependability (e.g., an in-depth description of the methodology and design to allow the study to be repeated), and confirmability (e.g., the steps to ensure the data and findings are not due to participant and/or researcher bias). ☐ For quantitative studies, explain the extent to which the data meet the assumptions of the statistical test and identify any potential factors that might impact the interpretation of the findings. Provide evidence of the psychometric soundness (i.e., adequate validity and reliability) of the instruments from the literature as well as in this study (as appropriate). Do not merely list and describe all the measures of validity and reliability. ☐ Mixed methods studies should include discussions of the trustworthiness of the data as well as validity and reliability. Begin writing here… Checklist: ☐ For qualitative studies, clearly identify the means by which the trustworthiness of the data was established. Discuss credibility (e.g., triangulation, member checks), transferability (e.g., the extent to which the findings are generalizable to other situations), dependability (e.g., an in-depth description of the methodology and design to allow the study to be repeated), and confirmability (e.g., the steps to ensure the data and findings are not due to participant and/or researcher bias). ☐ For quantitative studies, explain the extent to which the data meet the assumptions of the statistical test and identify any potential factors that might impact the interpretation of the findings. Provide evidence of the psychometric soundness (i.e., adequate validity and reliability) of the instruments from the literature as well as in this study (as appropriate). Do not merely list and describe all the measures of validity and reliability. ☐ Mixed methods studies should include discussions of the trustworthiness of the data as well as validity and
  • 35. reliability.Results Comment by Garrett Smiley: Section missing: Results Requirements have not been met (see highlighted areas bel ow). Checklist: ☐ Briefly discuss the overall study. Organize the presentation of the results by the research questions/hypotheses. ☐ Objectively report the results of the analysis without discussion, interpretation, or speculation. ☐ Provide an overview of the demographic information collected. It can be presented in a table. Ensure no potentially identifying information is reported. Begin writing here… Checklist: ☐ Briefly discuss the overall study. Organize the presentation of the results by the research questions/hypotheses. ☐ Objectively report the results of the analysis without discussion, interpretation, or speculation. ☐ Provide an overview of the demographic information collected. It can be presented in a table. Ensure no potentially identifying information is reported. Research Question 1/Hypothesis Comment by Garrett Smiley: Section missing: Research Question 1/Hypothesis Requirements have not been met (see highlighted areas below). Checklist: ☐ Report all the results (without discussion) salient to the research question/hypothesis. Identify common themes or patterns. ☐ Use tables and/or figures to report the results as appropriate. ☐ For quantitative studies, report any additional descriptive
  • 36. information as appropriate. Identify the assumptions of the statistical test and explain how the extent to which the data met these assumptions was tested. Report any violations and describe how they were managed as appropriate. Make decisions based on the results of the statistical analysis. Incl ude relevant test statistics, p values, and effect sizes in accordance with APA requirements. ☐ For qualitative studies, describe the steps taken to analyze the data to explain how the themes and categories were generated. Include thick descriptions of the participants’ experiences. Provide a comprehensive and coherent reconstruction of the information obtained from all the participants. ☐ For mixed methods studies, include all of the above. Text… ☐ Report all the results (without discussion) salient to the research question/hypothesis. Identify common themes or patterns. ☐Use tables and/or figures to report the results as appropriate. ☐ For quantitative studies, report any additional descriptive information as appropriate. Identify the assumptions of the statistical test and explain how the extent to which the data met these assumptions was tested. Report any violations and describe how they were managed as appropriate. Make decisions based on the results of the statistical analysis. Include relevant test statistics, p values, and effect sizes in accordance with APA requirements. ☐ For qualitative studies,describe the steps taken to analyze the data to explain how the themes and categories were generated. Include thick descriptions of the participants’ experiences. Provide a comprehensive and coherent reconstruction of the information obtained from all the participants. ☐ For mixed methods studies,include all of the above. Figure 1. Insert Figure Title Here
  • 37. Evaluation of the Findings Comment by Garrett Smiley: Section missing: Evaluation of the Findings Requirements have not been met (see highlighted areas below). Checklist: ☐ Interpret the results in light of the existing research and theoretical or conceptual framework (as discussed in Chapters 1 and 2). Briefly indicate the extent to which the results were consistent with existing research and theory. ☐ Organize this discussion by research question/hypothesis. ☐ Do not draw conclusions beyond what can be interpreted directly from the results. ☐ Devote approximately one to two pages to this section. Begin writing here… Checklist: ☐ Interpret the results in light of the existing research and theoretical or conceptual framework (as discussed in Chapters 1 and 2). Briefly indicate the extent to which the results were consistent with existing research and theory. ☐ Organize this discussion by research question/hypothesis. ☐ Do not draw conclusions beyond what can be interpreted directly from the results. ☐ Devote approximately one to two pages to this section.Summary Comment by Garrett Smiley: Section missing: Summary Requirements have not been met (see highlighted areas below). Checklist: ☐ Summarize the key points presented in the chapter. Begin writing here… Checklist: ☐ Summarize the key points presented in the chapter.
  • 38. Chapter 5: Implications, Recommendations, and Conclusions Comment by Garrett Smiley: Section missing: Introduction Requirements have not been met (see highlighted areas below). Checklist: ☐ Begin with an introduction and restatement of the problem and purpose sentences verbatim, and a brief review of methodology, design, results, and limitations. ☐ Conclude with a brief overview of the chapter. Begin writing here… Checklist: ☐ Begin with an introduction and restatement of the problem and purpose sentences verbatim, and a brief review of methodology, design, results, and limitations. ☐ Conclude with a brief overview of the chapter.Implications Comment by Garrett Smiley: Section missing: Implications Requirements have not been met (see highlighted areas below). Checklist: ☐ Organize the discussion around each research question and (when appropriate) hypothesis individually. Support all the conclusions with one or more findings from the study. ☐ Discuss any factors that might have influenced the interpretation of the results. ☐ Present the results in the context of the study by describing the extent to which they address the study problem and purpose and contribute to the existing literature and framework described in Chapter 2. ☐ Describe the extent to which the results are consistent with existing research and theory and provide potential explanations for unexpected or divergent results. ☐ Identify the most significant implications and consequences
  • 39. of the dissertation (whether positive and/or negative) to society/desired societal outcomes and distinguish probable from improbable implications. Begin writing here… Checklist: ☐ Organize the discussion around each research question and (when appropriate) hypothesis individually. Support all the conclusions with one or more findings from the study. ☐ Discuss any factors that might have influenced the interpretation of the results. ☐ Present the results in the context of the study by describing the extent to which they address the study problem and purpose and contribute to the existing literature and framework described in Chapter 2. ☐ Describe the extent to which the results are consistent with existing research and theory and provide potential explanations for unexpected or divergent results. ☐ Identify the most significant implications and consequences of the dissertation (whether positive and/or negative) to society/desired societal outcomes and distinguish probable from improbable implications. Research Question 1/Hypothesis Text…Recommendations for Practice Comment by Garrett Smiley: Section missing: Recommendations for Practice Requirements have not been met (see highlighted areas below). Checklist: ☐ Discuss recommendations for how the findings of the study can be applied to practice and/or theory. Support all the recommendations with at least one finding from the study and frame them in the literature from Chapter 2. ☐ Do not overstate the applicability of the findings. Begin writing here…
  • 40. Checklist: ☐ Discuss recommendations for how the findings of the study can be applied to practice and/or theory. Support all the recommendations with at least one finding from the study and frame them in the literature from Chapter 2. ☐ Do not overstate the applicability of the findings.Recommendations for Future Research Comment by Garrett Smiley: Section missing: Recommendations for Future Research Requirements have not been met (see highlighted areas below). Checklist: ☐ Based on the framework, findings, and implications, explain what future researchers might do to learn from and build upon this study. Justify these explanations. ☐ Discuss how future researchers can improve upon this study, given its limitations. ☐ Explain what the next logical step is in this line of resear ch. Begin writing here… Checklist: ☐ Based on the framework, findings, and implications, explain what future researchers might do to learn from and build upon this study. Justify these explanations. ☐ Discuss how future researchers can improve upon this study, given its limitations. ☐ Explain what the next logical step is in this line of research. Conclusions Comment by Garrett Smiley: Section missing: Conclusions Requirements have not been met (see highlighted areas below). Checklist: ☐ Provide a strong, concise conclusion to include a summary of
  • 41. the study, the problem addressed, and the importance of the study. ☐ Present the “take-home message” of the entire study. ☐ Emphasize what the results of the study mean with respect to previous research and either theory (PhD studies) or practice (applied studies). Begin writing here… Checklist: ☐ Provide a strong, concise conclusion to include a summary of the study, the problem addressed, and the importance of the study. ☐ Present the “take-home message” of the entire study. ☐ Emphasize what the results of the study mean with respect to previous research and either theory (PhD studies) or practice (applied studies). References Comment by Garrett Smiley: Section missing: References Correct your APA errors here. Here’s some example references that are properly formatted: Ajournalarticle, R. H., Spud, P. T., & Psychologist, R. M. (2016). Title of journal article goes here. Journal of Research in Personality, 22, 236-252. https://doi.org/doi:10.1016/0032- 026X.56.6.895* B’Onlinesourcesareconfusing, S. O. (2010). Search for answers at apastyle.org and include issue numbers after volume numbers when there is no DOI. Journal of Articles Without Digital Object Identifiers, 127 (3), 816-826. Cmagazinearticle, B. E. (2009, July). Note the last names on this page: Each source type has to be formatted in a different way. [Special issue]. Prose Magazine, 126 (5), 96-134. Dbookreference, S. M., Orman, T. P., & Carey, R. (1967).
  • 42. Google scholar’s “cite” feature is usually accurate and time- saving. Pearson. O’encyclopedia, S. E. (1993). Words. In The new encyclopedia Britannica (vol. 38, pp. 745-758). Chicago, IL: Penguin. Pchapter, P. R., & Inaneditedvolume, J. C. (2001). Scientific research papers provide evidence of frustration with giant style manuals. In P. Z. Wildlifeconservation, R. Dawkins, & J. H. Dennett (Eds.), Research papers are hard work but boy are they good for you (pp. 123-256). New York, NY: Simon & Schuster. Qosenberg, Morris. (1994, September 11). This is how you cite an online news article that has an author. The Washington Post. http://www.washingtonpost.com/dir/subdir/2014/05/11/a-d9- 11e3_story.html Checklist: ☐ Please go through and correct all references; use the easy to understand reference examples that I have provided in my tailored template. The key is to make sure you adhere rigidly to the respective example (with the most common example being that for a journal article). ☐ Create your reference list as you develop each section. As each citation is included in the paper, insert the reference in this section. ☐ For each reference that is listed, there must be at least one corresponding citation within the body of the text and vice versa. ☐ The references should be alphabetized by the last name of the first author. ☐ If using a citation software, ensure all information is included and properly formatted. Although such programs can be helpful, they are not always correct.
  • 43. Young, A., & Yung, M. (2017). Cryptovirology: The birth, neglect, and explosion of ransomware. Communications of the ACM, 60(7), 24-26. Doi:10.1145/3097347 Holt, T. J., Leukfeldt, R., & van de Weijer, S. (2020). An examination of motivation and routine activity theory to account for cyberattacks against Dutch web sites. Criminal Justice and Behavior, 47(4), 487-505. Dhinnesh, N. (2020). Analysis of ransomware and its prevention. Global Research and Development Journal For Engineering, 5(3), 1-4. Poudyal, S., & Dasgupta, D. (2021). Analysis of crypto- ransomware using ML-based multi-level profiling. IEEE Access, 9, 122532-122547. Https://doi: 10.1109/ACCESS.2021.3109260. Williams, C., Donaldson, S., & Siegel, S. (2020). Cyberdefense Concepts. In Building an Effective Security Program (pp. 55- 79). De Gruyter. de Melo, S. N., Pereira, D. V., Andresen, M. A., & Matias, L. F. (2018). Spatial/temporal variations of crime: A routine activity theory perspective. International journal of offender therapy and comparative criminology, 62(7), 1967-1991. Malecki, F. (2019). Best practices for preventing and recovering from a ransomware attack. Computer Fraud & Security, 2019(3), 8-10. Tuttle, W. J. (2020). Effective Strategies Small Business Leaders Use to Address Ransomware (Doctoral dissertation, Walden University). Appendix X: XXX XXX Comment by Garrett Smiley: Section missing:
  • 44. Appendices Requirements have not been met (see highlighted areas below). Checklist: ☐ Remove all boilerplate and make sure that you have appendices for all pertinent areas: IRB approval letter, instruments/surveys, site permission letters, instrument/survey permission letters, etc. ☐ Each appendix that is referenced in the text should appear in this section at the end of the manuscript. Appendices should be listed in the order in which they are referenced in the text. ☐ Remember to include each appendix in your Table of Contents ☐ Be sure to de-identify all materials so that readers cannot identify participants or where the data were specifically collected. Insert Appendix X content here…