SlideShare a Scribd company logo
1 of 2
Abomhara, M., & Koien, G.M. (2015). Cyber security and the
internet of things: Vulnerabilities, threats, intruders, and
attacks.
Journal of Cyber Security, 4
, 65-88. Doi: 10.13052/jcsm2245-1439.414
and evaluate it in 3 pages (800 words), using your own words,
by addressing the following:
What did the authors investigate, and in general how did they
do so?
Identify the hypothesis or question being tested
Summarize the overall article.
Identify the conclusions of the authors
Indicate whether or not you think the data support their
conclusions/hypothesis
Consider alternative explanations for the results
Provide any additional comments pertaining to other
approaches to testing their hypothesis (logical follow-up
studies to build on, confirm or refute the conclusions)
The relevance or importance of the study
The appropriateness of the experimental design
Abomhara, M., & Koien, G.M. (2015).  Cyber security and the internet.docx

More Related Content

Similar to Abomhara, M., & Koien, G.M. (2015).  Cyber security and the internet.docx

U10D1-68 - Credibility, Dependability, and TransferabilityFor th.docx
U10D1-68 - Credibility, Dependability, and TransferabilityFor th.docxU10D1-68 - Credibility, Dependability, and TransferabilityFor th.docx
U10D1-68 - Credibility, Dependability, and TransferabilityFor th.docx
gibbonshay
 
BUSI 505Research Project – Draft InstructionsUsing your Annota
BUSI 505Research Project – Draft InstructionsUsing your AnnotaBUSI 505Research Project – Draft InstructionsUsing your Annota
BUSI 505Research Project – Draft InstructionsUsing your Annota
VannaSchrader3
 
Common Models in Health Informatics EvaluationHave you ever watche.docx
Common Models in Health Informatics EvaluationHave you ever watche.docxCommon Models in Health Informatics EvaluationHave you ever watche.docx
Common Models in Health Informatics EvaluationHave you ever watche.docx
bartholomeocoombs
 
Falon Deimler Methodological Workshop Presentation
Falon Deimler Methodological Workshop PresentationFalon Deimler Methodological Workshop Presentation
Falon Deimler Methodological Workshop Presentation
Falon Deimler
 
Common Models in Health Informatics Evaluation.docx
Common Models in Health Informatics Evaluation.docxCommon Models in Health Informatics Evaluation.docx
Common Models in Health Informatics Evaluation.docx
write31
 
Discussion Validity in Quantitative Research DesignsValidity in.docx
Discussion Validity in Quantitative Research DesignsValidity in.docxDiscussion Validity in Quantitative Research DesignsValidity in.docx
Discussion Validity in Quantitative Research DesignsValidity in.docx
lefrancoishazlett
 
Write a research report based on a hypothetical research study.  Con.docx
Write a research report based on a hypothetical research study.  Con.docxWrite a research report based on a hypothetical research study.  Con.docx
Write a research report based on a hypothetical research study.  Con.docx
arnoldmeredith47041
 
#35538 Topic Week 10 Weighing the EvidenceNumber of Pages 1 .docx
#35538 Topic Week 10 Weighing the EvidenceNumber of Pages 1 .docx#35538 Topic Week 10 Weighing the EvidenceNumber of Pages 1 .docx
#35538 Topic Week 10 Weighing the EvidenceNumber of Pages 1 .docx
AASTHA76
 
Developing PICO QuestionsDetermining the topic of an evaluation .docx
Developing PICO QuestionsDetermining the topic of an evaluation .docxDeveloping PICO QuestionsDetermining the topic of an evaluation .docx
Developing PICO QuestionsDetermining the topic of an evaluation .docx
eve2xjazwa
 
QualitativeAnalysis_W2015.ppt
QualitativeAnalysis_W2015.pptQualitativeAnalysis_W2015.ppt
QualitativeAnalysis_W2015.ppt
RabinThapa27
 

Similar to Abomhara, M., & Koien, G.M. (2015).  Cyber security and the internet.docx (20)

U10D1-68 - Credibility, Dependability, and TransferabilityFor th.docx
U10D1-68 - Credibility, Dependability, and TransferabilityFor th.docxU10D1-68 - Credibility, Dependability, and TransferabilityFor th.docx
U10D1-68 - Credibility, Dependability, and TransferabilityFor th.docx
 
BUSI 505Research Project – Draft InstructionsUsing your Annota
BUSI 505Research Project – Draft InstructionsUsing your AnnotaBUSI 505Research Project – Draft InstructionsUsing your Annota
BUSI 505Research Project – Draft InstructionsUsing your Annota
 
EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
 
Ironridgehttpshub2.devry.edunode29104Summerville.docx
Ironridgehttpshub2.devry.edunode29104Summerville.docxIronridgehttpshub2.devry.edunode29104Summerville.docx
Ironridgehttpshub2.devry.edunode29104Summerville.docx
 
Common Models in Health Informatics EvaluationHave you ever watche.docx
Common Models in Health Informatics EvaluationHave you ever watche.docxCommon Models in Health Informatics EvaluationHave you ever watche.docx
Common Models in Health Informatics EvaluationHave you ever watche.docx
 
Part II: Design
Part II: DesignPart II: Design
Part II: Design
 
Falon Deimler Methodological Workshop Presentation
Falon Deimler Methodological Workshop PresentationFalon Deimler Methodological Workshop Presentation
Falon Deimler Methodological Workshop Presentation
 
Common Models in Health Informatics Evaluation.docx
Common Models in Health Informatics Evaluation.docxCommon Models in Health Informatics Evaluation.docx
Common Models in Health Informatics Evaluation.docx
 
Research methodology (2)
Research methodology (2)Research methodology (2)
Research methodology (2)
 
Article Analysis and Evaluation of Research EthicsArticl.docx
Article Analysis and Evaluation of Research EthicsArticl.docxArticle Analysis and Evaluation of Research EthicsArticl.docx
Article Analysis and Evaluation of Research EthicsArticl.docx
 
Discussion Validity in Quantitative Research DesignsValidity in.docx
Discussion Validity in Quantitative Research DesignsValidity in.docxDiscussion Validity in Quantitative Research DesignsValidity in.docx
Discussion Validity in Quantitative Research DesignsValidity in.docx
 
Write a research report based on a hypothetical research study.  Con.docx
Write a research report based on a hypothetical research study.  Con.docxWrite a research report based on a hypothetical research study.  Con.docx
Write a research report based on a hypothetical research study.  Con.docx
 
Article Analysis and Evaluation of Research EthicsArticl.docx
Article Analysis and Evaluation of Research EthicsArticl.docxArticle Analysis and Evaluation of Research EthicsArticl.docx
Article Analysis and Evaluation of Research EthicsArticl.docx
 
Lecture 6 qualitative data analysis
Lecture 6 qualitative data analysisLecture 6 qualitative data analysis
Lecture 6 qualitative data analysis
 
Methodology chapter
Methodology chapterMethodology chapter
Methodology chapter
 
#35538 Topic Week 10 Weighing the EvidenceNumber of Pages 1 .docx
#35538 Topic Week 10 Weighing the EvidenceNumber of Pages 1 .docx#35538 Topic Week 10 Weighing the EvidenceNumber of Pages 1 .docx
#35538 Topic Week 10 Weighing the EvidenceNumber of Pages 1 .docx
 
Qualitative Research Methods for Public Health
Qualitative Research Methods for Public HealthQualitative Research Methods for Public Health
Qualitative Research Methods for Public Health
 
Developing PICO QuestionsDetermining the topic of an evaluation .docx
Developing PICO QuestionsDetermining the topic of an evaluation .docxDeveloping PICO QuestionsDetermining the topic of an evaluation .docx
Developing PICO QuestionsDetermining the topic of an evaluation .docx
 
Fundamentals of Research Article and Scientific Methods.pptx
Fundamentals of Research Article and Scientific Methods.pptxFundamentals of Research Article and Scientific Methods.pptx
Fundamentals of Research Article and Scientific Methods.pptx
 
QualitativeAnalysis_W2015.ppt
QualitativeAnalysis_W2015.pptQualitativeAnalysis_W2015.ppt
QualitativeAnalysis_W2015.ppt
 

More from ronak56

According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
ronak56
 
According to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docxAccording to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docx
ronak56
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
ronak56
 
According to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docxAccording to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docx
ronak56
 
According to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docxAccording to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docx
ronak56
 
According to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docxAccording to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docx
ronak56
 

More from ronak56 (20)

According to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docxAccording to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docx
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
 
According to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docxAccording to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docx
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
 
According to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docxAccording to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docx
 
According to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docxAccording to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docx
 
According to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docxAccording to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docx
 
According to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docxAccording to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docx
 
According to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docxAccording to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docx
 
According to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docxAccording to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docx
 
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docxAccording to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docx
 
According to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docxAccording to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docx
 
According to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docxAccording to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docx
 
According to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docxAccording to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docx
 
According to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docxAccording to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docx
 
According to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docxAccording to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docx
 
According to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docxAccording to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docx
 
According to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docxAccording to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docx
 
Access the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docxAccess the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Abomhara, M., & Koien, G.M. (2015).  Cyber security and the internet.docx

  • 1. Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4 , 65-88. Doi: 10.13052/jcsm2245-1439.414 and evaluate it in 3 pages (800 words), using your own words, by addressing the following: What did the authors investigate, and in general how did they do so? Identify the hypothesis or question being tested Summarize the overall article. Identify the conclusions of the authors Indicate whether or not you think the data support their conclusions/hypothesis Consider alternative explanations for the results Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions) The relevance or importance of the study The appropriateness of the experimental design