SlideShare a Scribd company logo
RESEARCH PROJECT
Select a topic of your choosing in the area of Access Control
and write a research paper as part of a group project. Make this
a paper appropriate for journal publication. That is you must
endeavor to meet all the requirements of such a project. Hence,
your paper should include all or most of the following:
1. Appropriate figures and tables
2. The research method(s)
3. The results
4. The discussion
5. Clear conclusion
6. A compelling introduction
7. An abstract
8. A well concise and descriptive title
9. Acknowledgements
10. References
Deliverables: a) Research proposal approval
b) Research paper presentation
c) Final paper submission
Milestones
1) Submission of Proposal
Due Date: June 14, 2019
2) Presentation of the data files
Due Date: June 15, 2019
3) Final Project Paper
Due Date: June 23, 2019
Lack of security in personal devices over devices provided by
an organization
Research proposal Overview
The current trends show increase in use of personal devices for
professional work, but the risks involved with this practice is
very high due to lack of control over such devices. Some of the
common security issues that arise due to devices that are
brought for work related activities are insecure network
connections, lost or stolen device, malware targeting these
devices, intervention of third-party applications. When coming
to the devices at work the access is restricted and standard
security procedures are laid on these devices. It will be difficult
for hackers to intervene these devices with a strict layer of
firewalls around them.
This research classified the issues of access control using
personal devices into three main categories. First, a trust which
refers to how much access does an organization provides to
their employees connecting to applications from a remote
location even with an unknown device. Second, a protection
which refers to preserving data even when devices are lost or
stolen. Third, a control which refers to how an organization
enforce compliance with corporate guidelines when the user is
on the move (Tokuyoshi, 2013). We will try to investigate on
the issues related to access control using the personal devices
by dividing them into five main categories.
1. Mobile device security issues
2. Lack of access control enforcement
3. Lack of data and policy protection
4. Platform dependent
5. Unaware of procedures and rights
The main aim of this research is to investigate the most recent
trends touching on the access control issues in using personal
devices concerning information security and also to analyze the
essential and comprehensive requirements needed to develop an
access control framework in the future.
References
B. Tokuyoshi, "The security implications of BYOD," Network
Security, vol. 2013, pp. 12-13, 2013.
J. Pinchot and K. Paullet, "BRING YOUR OWN DEVICE TO
WORK: BENEFITS, SECURITY RISKS, AND GOVERNANCE
ISSUES," Issues in Information Systems, vol. 16, 2015.

More Related Content

Similar to RESEARCH PROJECTSelect a topic of your choosing in the area of.docx

Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
Alexander Deucalion
 
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXWIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
IJNSA Journal
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
CSCJournals
 
Grading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docxGrading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docx
whittemorelucilla
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
IRJET Journal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
IRJET Journal
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
IJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
IJMIT JOURNAL
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Jim Kaplan CIA CFE
 
I018145157
I018145157I018145157
I018145157
IOSR Journals
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
cowinhelen
 
76 s201913
76 s20191376 s201913
76 s201913
IJRAT
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
CSCJournals
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
IJERA Editor
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
IRJET Journal
 
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docxAPA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
justine1simpson78276
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for Smartphones
CSCJournals
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
IJITE
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
IJITE
 
Enhancing Mobile Learning Security
Enhancing Mobile Learning SecurityEnhancing Mobile Learning Security
Enhancing Mobile Learning Security
IJITE
 

Similar to RESEARCH PROJECTSelect a topic of your choosing in the area of.docx (20)

Trends in Information Management
Trends in Information ManagementTrends in Information Management
Trends in Information Management
 
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEXWIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
 
Grading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docxGrading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docx
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
I018145157
I018145157I018145157
I018145157
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
 
76 s201913
76 s20191376 s201913
76 s201913
 
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
 
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docxAPA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for Smartphones
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
 
Enhancing Mobile Learning Security
Enhancing Mobile Learning SecurityEnhancing Mobile Learning Security
Enhancing Mobile Learning Security
 

More from gholly1

Research Review Forms – Student NameResearch Review Forms Template.docx
Research Review Forms – Student NameResearch Review Forms Template.docxResearch Review Forms – Student NameResearch Review Forms Template.docx
Research Review Forms – Student NameResearch Review Forms Template.docx
gholly1
 
Research Request Agreement Report A. BackgroundThe Western Con.docx
Research Request Agreement Report A. BackgroundThe Western Con.docxResearch Request Agreement Report A. BackgroundThe Western Con.docx
Research Request Agreement Report A. BackgroundThe Western Con.docx
gholly1
 
Research ReportsCorporate research is an important but often o.docx
Research ReportsCorporate research is an important but often o.docxResearch ReportsCorporate research is an important but often o.docx
Research ReportsCorporate research is an important but often o.docx
gholly1
 
Research ReportEthical perspective on quality of care the.docx
Research ReportEthical perspective on quality of care the.docxResearch ReportEthical perspective on quality of care the.docx
Research ReportEthical perspective on quality of care the.docx
gholly1
 
Research Report Topic Security of Social NetworksReport m.docx
Research Report Topic Security of Social NetworksReport m.docxResearch Report Topic Security of Social NetworksReport m.docx
Research Report Topic Security of Social NetworksReport m.docx
gholly1
 
Research Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docxResearch Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docx
gholly1
 
Research Proposal DraftBy the due date assigned, write a 2 page .docx
Research Proposal DraftBy the due date assigned, write a 2 page .docxResearch Proposal DraftBy the due date assigned, write a 2 page .docx
Research Proposal DraftBy the due date assigned, write a 2 page .docx
gholly1
 
Research Report Guide A Guide for BA634 Students .docx
Research Report Guide A Guide for BA634 Students .docxResearch Report Guide A Guide for BA634 Students .docx
Research Report Guide A Guide for BA634 Students .docx
gholly1
 
Research QuestionORGANIZATIONAL ISSUESCaruana, A. an.docx
Research QuestionORGANIZATIONAL ISSUESCaruana, A. an.docxResearch QuestionORGANIZATIONAL ISSUESCaruana, A. an.docx
Research QuestionORGANIZATIONAL ISSUESCaruana, A. an.docx
gholly1
 
Research Report Cardiac Conditions ProjectStudent Name.docx
Research Report  Cardiac Conditions ProjectStudent Name.docxResearch Report  Cardiac Conditions ProjectStudent Name.docx
Research Report Cardiac Conditions ProjectStudent Name.docx
gholly1
 
Research Question· AccuratelyClearly   states group’s Resea.docx
Research Question· AccuratelyClearly   states group’s Resea.docxResearch Question· AccuratelyClearly   states group’s Resea.docx
Research Question· AccuratelyClearly   states group’s Resea.docx
gholly1
 
Research question Option 1 What effect does logistics ma.docx
Research question Option 1 What effect does logistics ma.docxResearch question Option 1 What effect does logistics ma.docx
Research question Option 1 What effect does logistics ma.docx
gholly1
 
Research questionsIt was not known how criminal offenders percei.docx
Research questionsIt was not known how criminal offenders percei.docxResearch questionsIt was not known how criminal offenders percei.docx
Research questionsIt was not known how criminal offenders percei.docx
gholly1
 
Research Question How has Greek Life ChangedImpacted the life of c.docx
Research Question How has Greek Life ChangedImpacted the life of c.docxResearch Question How has Greek Life ChangedImpacted the life of c.docx
Research Question How has Greek Life ChangedImpacted the life of c.docx
gholly1
 
research question is how Liziqis video express chiese traditional t.docx
research question is how Liziqis video express chiese traditional t.docxresearch question is how Liziqis video express chiese traditional t.docx
research question is how Liziqis video express chiese traditional t.docx
gholly1
 
Research Question How does social media effect the perception of be.docx
Research Question How does social media effect the perception of be.docxResearch Question How does social media effect the perception of be.docx
Research Question How does social media effect the perception of be.docx
gholly1
 
Research Question What is the research questions What type .docx
Research Question What is the research questions What type .docxResearch Question What is the research questions What type .docx
Research Question What is the research questions What type .docx
gholly1
 
Research public health issues on the Climate Change or Topic.docx
Research public health issues on the Climate Change or Topic.docxResearch public health issues on the Climate Change or Topic.docx
Research public health issues on the Climate Change or Topic.docx
gholly1
 
Research Quantitative vs QualitativeBackground Quantitative da.docx
Research Quantitative vs QualitativeBackground Quantitative da.docxResearch Quantitative vs QualitativeBackground Quantitative da.docx
Research Quantitative vs QualitativeBackground Quantitative da.docx
gholly1
 
Research Quantitative vs QualitativeBackground Quantitativ.docx
Research Quantitative vs QualitativeBackground Quantitativ.docxResearch Quantitative vs QualitativeBackground Quantitativ.docx
Research Quantitative vs QualitativeBackground Quantitativ.docx
gholly1
 

More from gholly1 (20)

Research Review Forms – Student NameResearch Review Forms Template.docx
Research Review Forms – Student NameResearch Review Forms Template.docxResearch Review Forms – Student NameResearch Review Forms Template.docx
Research Review Forms – Student NameResearch Review Forms Template.docx
 
Research Request Agreement Report A. BackgroundThe Western Con.docx
Research Request Agreement Report A. BackgroundThe Western Con.docxResearch Request Agreement Report A. BackgroundThe Western Con.docx
Research Request Agreement Report A. BackgroundThe Western Con.docx
 
Research ReportsCorporate research is an important but often o.docx
Research ReportsCorporate research is an important but often o.docxResearch ReportsCorporate research is an important but often o.docx
Research ReportsCorporate research is an important but often o.docx
 
Research ReportEthical perspective on quality of care the.docx
Research ReportEthical perspective on quality of care the.docxResearch ReportEthical perspective on quality of care the.docx
Research ReportEthical perspective on quality of care the.docx
 
Research Report Topic Security of Social NetworksReport m.docx
Research Report Topic Security of Social NetworksReport m.docxResearch Report Topic Security of Social NetworksReport m.docx
Research Report Topic Security of Social NetworksReport m.docx
 
Research Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docxResearch Report #2 Emerging Issues Risk Analysis and Report.docx
Research Report #2 Emerging Issues Risk Analysis and Report.docx
 
Research Proposal DraftBy the due date assigned, write a 2 page .docx
Research Proposal DraftBy the due date assigned, write a 2 page .docxResearch Proposal DraftBy the due date assigned, write a 2 page .docx
Research Proposal DraftBy the due date assigned, write a 2 page .docx
 
Research Report Guide A Guide for BA634 Students .docx
Research Report Guide A Guide for BA634 Students .docxResearch Report Guide A Guide for BA634 Students .docx
Research Report Guide A Guide for BA634 Students .docx
 
Research QuestionORGANIZATIONAL ISSUESCaruana, A. an.docx
Research QuestionORGANIZATIONAL ISSUESCaruana, A. an.docxResearch QuestionORGANIZATIONAL ISSUESCaruana, A. an.docx
Research QuestionORGANIZATIONAL ISSUESCaruana, A. an.docx
 
Research Report Cardiac Conditions ProjectStudent Name.docx
Research Report  Cardiac Conditions ProjectStudent Name.docxResearch Report  Cardiac Conditions ProjectStudent Name.docx
Research Report Cardiac Conditions ProjectStudent Name.docx
 
Research Question· AccuratelyClearly   states group’s Resea.docx
Research Question· AccuratelyClearly   states group’s Resea.docxResearch Question· AccuratelyClearly   states group’s Resea.docx
Research Question· AccuratelyClearly   states group’s Resea.docx
 
Research question Option 1 What effect does logistics ma.docx
Research question Option 1 What effect does logistics ma.docxResearch question Option 1 What effect does logistics ma.docx
Research question Option 1 What effect does logistics ma.docx
 
Research questionsIt was not known how criminal offenders percei.docx
Research questionsIt was not known how criminal offenders percei.docxResearch questionsIt was not known how criminal offenders percei.docx
Research questionsIt was not known how criminal offenders percei.docx
 
Research Question How has Greek Life ChangedImpacted the life of c.docx
Research Question How has Greek Life ChangedImpacted the life of c.docxResearch Question How has Greek Life ChangedImpacted the life of c.docx
Research Question How has Greek Life ChangedImpacted the life of c.docx
 
research question is how Liziqis video express chiese traditional t.docx
research question is how Liziqis video express chiese traditional t.docxresearch question is how Liziqis video express chiese traditional t.docx
research question is how Liziqis video express chiese traditional t.docx
 
Research Question How does social media effect the perception of be.docx
Research Question How does social media effect the perception of be.docxResearch Question How does social media effect the perception of be.docx
Research Question How does social media effect the perception of be.docx
 
Research Question What is the research questions What type .docx
Research Question What is the research questions What type .docxResearch Question What is the research questions What type .docx
Research Question What is the research questions What type .docx
 
Research public health issues on the Climate Change or Topic.docx
Research public health issues on the Climate Change or Topic.docxResearch public health issues on the Climate Change or Topic.docx
Research public health issues on the Climate Change or Topic.docx
 
Research Quantitative vs QualitativeBackground Quantitative da.docx
Research Quantitative vs QualitativeBackground Quantitative da.docxResearch Quantitative vs QualitativeBackground Quantitative da.docx
Research Quantitative vs QualitativeBackground Quantitative da.docx
 
Research Quantitative vs QualitativeBackground Quantitativ.docx
Research Quantitative vs QualitativeBackground Quantitativ.docxResearch Quantitative vs QualitativeBackground Quantitativ.docx
Research Quantitative vs QualitativeBackground Quantitativ.docx
 

Recently uploaded

বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 

Recently uploaded (20)

বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 

RESEARCH PROJECTSelect a topic of your choosing in the area of.docx

  • 1. RESEARCH PROJECT Select a topic of your choosing in the area of Access Control and write a research paper as part of a group project. Make this a paper appropriate for journal publication. That is you must endeavor to meet all the requirements of such a project. Hence, your paper should include all or most of the following: 1. Appropriate figures and tables 2. The research method(s) 3. The results 4. The discussion 5. Clear conclusion 6. A compelling introduction 7. An abstract 8. A well concise and descriptive title 9. Acknowledgements 10. References Deliverables: a) Research proposal approval b) Research paper presentation c) Final paper submission Milestones 1) Submission of Proposal Due Date: June 14, 2019 2) Presentation of the data files Due Date: June 15, 2019 3) Final Project Paper Due Date: June 23, 2019
  • 2. Lack of security in personal devices over devices provided by an organization Research proposal Overview The current trends show increase in use of personal devices for professional work, but the risks involved with this practice is very high due to lack of control over such devices. Some of the common security issues that arise due to devices that are brought for work related activities are insecure network connections, lost or stolen device, malware targeting these devices, intervention of third-party applications. When coming to the devices at work the access is restricted and standard security procedures are laid on these devices. It will be difficult for hackers to intervene these devices with a strict layer of firewalls around them. This research classified the issues of access control using personal devices into three main categories. First, a trust which refers to how much access does an organization provides to their employees connecting to applications from a remote location even with an unknown device. Second, a protection which refers to preserving data even when devices are lost or stolen. Third, a control which refers to how an organization enforce compliance with corporate guidelines when the user is on the move (Tokuyoshi, 2013). We will try to investigate on the issues related to access control using the personal devices by dividing them into five main categories. 1. Mobile device security issues 2. Lack of access control enforcement 3. Lack of data and policy protection 4. Platform dependent 5. Unaware of procedures and rights The main aim of this research is to investigate the most recent trends touching on the access control issues in using personal devices concerning information security and also to analyze the essential and comprehensive requirements needed to develop an access control framework in the future.
  • 3. References B. Tokuyoshi, "The security implications of BYOD," Network Security, vol. 2013, pp. 12-13, 2013. J. Pinchot and K. Paullet, "BRING YOUR OWN DEVICE TO WORK: BENEFITS, SECURITY RISKS, AND GOVERNANCE ISSUES," Issues in Information Systems, vol. 16, 2015.