Cyber security capabilities



The purpose of this exercise to help you think through and apply the theoretical approaches you have learned about this week. Obviously, not all research projects lend themselves to every approach but if a researcher can identify a theory in which his particular research can fit, that is desirable. A researcher can also use approaches that he sees in other projects and simply adapt the approach to his own project if it is feasible. This exercise is intended to have you think about what approach you might reasonably take if you had the time to operationalize the research which you may or may not have the time to do in this course. That said, choose a theoretical approach that is reasonable and be able to explain how that theory applies to your research topic. State your course research project’s specific research question. (Has American opinion, and politics hindered our national and cyber security capabilities, to protect ourselves) Compare at least two theoretical approaches that might provide some insight into your research direction. Please describe them briefly and explain which aspects of the theory are helpful to you. Which, if any, might you choose for your project and why (or why not)? Locate an article that uses a theoretical approach that might help you frame your own argument. Provide a short explanation of the methodology used in the article and which elements would be useful to you.

Instruction Files

Related Questions in marketing category

The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.