Curtin University Homepage
  • Library
  • Help
    • Admin

    espace - Curtin’s institutional repository

    JavaScript is disabled for your browser. Some features of this site may not work without it.
    View Item 
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item
    • espace Home
    • espace
    • Curtin Research Publications
    • View Item

    Two Approaches to Information Security Doctoral Research

    Access Status
    Fulltext not available
    Authors
    Armstrong, Helen
    Date
    2011
    Type
    Conference Paper
    
    Metadata
    Show full item record
    Citation
    Armstrong, Helen. 2011. Two Approaches to Information Security Doctoral Research, in Futcher, L. (ed), 7th World Conference on Information Security Education, Jun 9 2011, pp. 55-62. Lucerne, Switzerland: International Federation for Information Processing (IFIP).
    Source Title
    Proceedings from the seventh world conference on information security education
    Source Conference
    World Conference on Information Security Education
    ISBN
    1933510943
    School
    School of Information Systems
    URI
    http://hdl.handle.net/20.500.11937/12497
    Collection
    • Curtin Research Publications
    Abstract

    Researchers embarking upon doctoral research in information security face numerous challenges at the commencement of their studies. Students often face confusion as they consider where to start and how to progress. The objectives of the research need to be clearly defined before commencing the project. The research questions, methodology, data and analysis are inextricably tied to the objectives, and as such a top-down approach is recommended. This paper discusses two approaches to doctoral research, top-down and bottom-up. The paper is designed to guide students at the commencement of their information security doctoral research. These guidelines may also be of value to the supervisor.

    Related items

    Showing items related by title, author, creator and subject.

    • New framework for authentication and authorization for e-health service systems
      Han, Song; Skinner, Geoffrey; Potdar, Vidyasagar; Chang, Elizabeth; Wu, Chen (2006)
      The development of information technology has eased the medical services and provided the electronic health service in a way that a doctor can keep the records of patients in an information system and be informed of changes ...
    • Generative Control Theory for Information Security
      Raymond, B.; Baskerville, Richard (2014)
      Increasing information security losses, coupled with more closely regulated security risk disclosure, are raising the importance of information security standards for identifying control gaps and for implementing appropriate ...
    • Work Placement: Sensemaking among International Students
      Vu, Thai (2023)
      The doctoral research examined how international students make sense of and tackle challenges when securing in-person placements, preparing for placements, and enhancing organisational socialisation during placements in ...
    Advanced search

    Browse

    Communities & CollectionsIssue DateAuthorTitleSubjectDocument TypeThis CollectionIssue DateAuthorTitleSubjectDocument Type

    My Account

    Admin

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Follow Curtin

    • 
    • 
    • 
    • 
    • 

    CRICOS Provider Code: 00301JABN: 99 143 842 569TEQSA: PRV12158

    Copyright | Disclaimer | Privacy statement | Accessibility

    Curtin would like to pay respect to the Aboriginal and Torres Strait Islander members of our community by acknowledging the traditional owners of the land on which the Perth campus is located, the Whadjuk people of the Nyungar Nation; and on our Kalgoorlie campus, the Wongutha people of the North-Eastern Goldfields.