0% found this document useful (0 votes)
237 views3 pages

Research Proposal

Uploaded by

api-460973473
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
237 views3 pages

Research Proposal

Uploaded by

api-460973473
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

RESEARCH PROPOSAL

Vennela Chatla
Independent Research G/T
2018-2019

Title: Secret World of Hackers

Overview of Research:

This project focuses on cyber attacks and hackers behind it. This research is mean to
help bring awareness to the subject. In turn, helping stop the increasing amount of
cyber attacks and loss of personal data.

Background and Rationale:

Cyber attacks are becoming more and more relevant in the modern world today. More
people own internet connected devices than ever before. But internet connected
devices come come with vulnerabilities that hackers can take advantage of. Personal
information and identity theft is becoming very dangerous and people need to take more
precautions.

Research Methodology:

Research Question:
How can we prevent ever evolving cyber attacks that result in the loss of companies’
intellectual property and personal information?

Hypothesis:
Placing regulations and bringing awareness to the vulnerabilities of internet connected
devices will reduce the number of cyber attacks annually.

Articles that are online as informational videos are helping to educate audiences about
the dangers of cyber attacks. Research has shown that bringing light this epidemic can
help prevent losses of personal data and general attacks altogether. Informing the
public will result in people trying to take more precautions to help protect their
information and their devices.

The Research Design Model:


This study will follow a case-study research design. The focus will follow on a survey of
high school students and their knowledge of hackers and cyber attacks. I will also
conduct interviews with professionals that are knowledge on my project. I will contact
human resources via letters and emails. I will aska specific set of questions

Data Collection:
A data collection folder will be in use. It will contain surveys and information about high
schooler’s survey. It will also contain transcripts of interviews either via phone or email.
Interviews will come from cyber security companies or the red teams at various
companies. Questions will ask if cyber attacks are a major threat and questions will
along those lines. Lastly, the folder will contain a storyline for the final product :
documentary.

Product Objectives:

As a final project, I hope to create short documentary that can be shown to many people
informing the dangers of cyber attacks and spreading awareness about hackers. I also
hope to create a tri fold along with my research that will help my audience better
understand my project and use this item as a prop. This video will be uploaded to
youtube be the end

Logistical Considerations:

School Systems and Internet Connection will be necessary to execute the final product
and presentation. Contact with professionals in the field will also be needed as it
provides viable and useful information that would make my project more valuable.

In the following week, I will construct a timeline that will help guide my research and
make sure that I am on track to my final product.

Approval:

__________________ _______________________ ______________________


Student Signature G/T Resource Teacher Signature Advisor/Mentor Signature

Works Cited :

“Hackers Can Use Your Household Appliances to Trigger Power Outages.” ​Fortune​,
fortune.com/2018/10/17/hackers-household-appliances-power-outages/.

Khan Academy​, Khan Academy,


www.khanacademy.org/computing/computer-science/internet-intro/internet-works-intro/v/the-int
ernet-cybersecurity-and-crime​.
Smith, Alan D., and William T. Rupp. “Issues in Cybersecurity; Understanding the Potential
Risks Associated with Hackers/Crackers.” ​Information Management & Computer Security​, vol.
10, no. 4, 2002, pp. 178–183., doi:10.1108/09685220210436976.

Isaac, Mike. “Facebook Hack Included Search History and Location Data of Millions.” ​The New
York Times​, The New York Times, 12 Oct. 2018,

You might also like