Assignment 1 and 2 Cybercrime MANAGEMENT
Assignment 1 and 2 Cybercrime MANAGEMENT
Mr Sengu James
[email protected]
+263771 076 520
Individual Assignment 1
Think of a unique research topic of your choice possibly the subject you wish to pursue
in completing your studies. Craft a mini research project in not more than 50 pages
excluding the preliminary pages. Use Statistical Package For Social Scientists (SPSS) to
analyze your research data which corresponds to your drafted questionnaire. Utilize Ms
Word to write your document and ensure everything is on one document. Your text
should be justified. Also note that referencing and pagination should be automated.
Adopt specifications spelt out below on the project guide. The marking guide for this
assignment is attached below, follow its specifications.
Individual Assignment 2.
Building on your research topic and mini research project from Assignment 1, design a
questionnaire using Google Forms to collect data from participants. The questionnaire
should include:
Submission Requirements
Grading Criteria
Note: This assignment is a precursor to collecting real data for your research project.
Project Guide.
To most people the research process involves identifying a research problem designing
as study to address that problem, collecting and analyzing data, and interpreting the
result. However, the research process is incomplete without the very important final step
of reporting the results. Many investigations underestimate the time and discipline it
takes to report their findings.
Further much good research goes unnoticed because many investigations lack the skills
needed to report their findings in a proper manner. If research is going to contribute to
the knowledge base of your field or improve practice in some way, you need to report
your findings in a manner that is compatible with the research design you adopted for
your study. You therefore, need to familiarize yourself with the traditional format for
reporting social science research.
1. The length of your project /dissertation (main body) should be 50 pages (11 000
words). Longer report /dissertations, especially at BED and MED levels are
accepted with the permission of your supervisor. The word number should be
your guide rather than the number of pages.
2. SETTING
The setting should be 1,5 spacing. double line spacing is accepted where the
machine has no facility for 1,5 line space. use 12 font type.
3. MARGINS
4. PAGINATION
TITLE PAGE
1st Quarter: The Title of the report in no more than three lines or thirty words . set out
in the middle.
2nd Quarter: Your full Forenames and then your surname as you are registered at this
university.
3rd Quarter: Statement of fulfillment.
Dissertation /project report submitted in partial fulfillment of the requirements for the
Diploma in Adult Education.
University of Zimbabwe
EXAMPLE
ABSTRACT
The abstract is a summary of the report. It must be very brief, usually about 200 to
300 words, confining itself to the essentials, the research problem: the main features
of the design methods, the crucial results, and the overall conclusions. It must not
contain any new materials, or new conclusions, or anything which is not in the report
itself. on the other hand , the summary statement of the research problem in the
abstract can never replace a fuller statement in the report. Abstract and report must
both stands on their own.
The abstract must have an orderly structure ,written as coherent, connected propose
,not as a list, although it is often improved by appreciate paragraphing.
Diploma in Cyber Security Management
Mr Sengu James
[email protected]
+263771 076 520
The abstract is extremely important since after the title it is probably the first thing
that the reader (including the examiner) will look at. It might inform the reader and
whet his appetite ,or it might leave him fogged or even annoyed . weigh every word.
ACKNOWLEDGEMENTS
Carrying out research and writing reports usually involve the help and advice of
others. It is appropriate for the researcher to show his appreciation by briefly
acknowledging this. However , this should not be seen as a means of passing
responsibility on to the supervisor or anyone else. The responsibility for the research
and report rests squarely upon the researcher.
TABLE OF CONTENTS
Contains the table of contents from page 1 to the reference. The table of contents
gives a quick overview of the structure of the report, as well as the page location of
each section listed. It is one of those important sections along with the title, and the
summary, to which the reader turns first and which may encourage him to read on or
may have the opposite effect.
The headings of all major sections, such as chapters, should be listed in the order,
which they appear. The number of the page on which each begins should also be
shown. These page numbers are best set out in one column, usually on the right of
the content page. In this way they stand out clearly .The major subheading within
these chapters N on major sections N may also be listed. The page on which each of
these begins should also be shown, preferably in the same column as the other page
numbers.
Since the table of contents should be complete it should also list items such as : list
of tables , figures ,etc. the abstract, the notes (if they have been brought together in
a separate section at the end of the report ); any appendices, references and the
bibliography. The page on which each of these items begins should likewise be
shown.
The chapter and other headings listed in the table of contents should be brief N a
word or a phrase. Nevertheless they should make sense as they stand, so that the
table of contents is as intelligible as possible on its own: it is not very helpful simply
listing: “chapter1”, Chapter2” etc. The headings of these chapters should be given. At
the same time the table of contents should be kept fairly simple and streamlined.
Careful identification of the sub-heading may help to make the structure of the report
stand out more clearly, although excessive use of different levels of indentation can
have the opposite effect.
It is very helpful to indicate tables, figures, maps etc;and their page locations in
separate lists after the table of contents. Again the title of each table, figure map
etc,should be given, in abbreviated form if necessary, and not just table 1,etc
Diploma in Cyber Security Management
Mr Sengu James
[email protected]
+263771 076 520
List Of Abbreviations
Any abbreviations acronyms employed in the report (other than generally accepted
one such as “Dr” or “UNESCO”) may be conveniently explained in the text at the
point where they first occur especially if this can be done by means of debt
parenthesis. But such explanation within the text itself is not sufficient. Sholud the
reader need at a later stage to check back on the meaning of the abbreviation or
acronyms, he might have difficulty relocating the original explanation.
Hence it is best to devise an alphabetical list of all abbreviations or acronyms
showing their meanings. Such a list could either be located immediately after any list
of tables and figures or in an appendix.
CHAPTER ONE
1.1 Introduction
A synopsis of the historical events regarding the problem and that places the
problem into perspective so as to put the reader in a clear picture or context of the
problem.
It responds to the question : what has been going on and what efforts have been put
into place to address the particular concern ? The background should be about two
pages long.
It tells the theme that prompts the researcher to undertake the study, should enable
the reader to see the potential study as a problem. The statement should be
substantiated by statistical evidence if possible. Occasionally one can combine the
background and the statement of the problem and this facilitates seeing a
relationship between the picture (problem) and ground (background).
Your statement should not exceed half a page especially when it has been alluded to
in the background to the subsection.
This is a broad statement of intent and it is not measurable. The purpose statement
often repeats the topic and expounds on it.
An assumption is something accepted as true or as sure to, happen, but not proved.
Assumptions are utilized as cardinal guiding points towards acceptance of proven
researched phenomena or its rejection.
1.9.2 Delimitations
CHAPTER II
LITERATURE REVIEW
the chapter provides an important link between existing knowledge and the problem that
is being investigated. Literature review enhances the credibility of the research thus it is
important for you to be able to judge the quality of the review. It is also important to
locate research that is related to the problem.
CHAPTER III
3.0 METHODOLOGY
This chapter shows how the researcher planned and executed the study .
It consist of the following:
3.1 Introduction
It is important to refocus the reader reminding him of the purpose of the study since
he has been immersed into what other people have done in other studies. Also
provide a brief outline of the contents of the chapter which usually include the
following sub-sections:
Describe the design and justification for its choice in this particular study. The
justification should highlight the design’s relationship to:
Diploma in Cyber Security Management
Mr Sengu James
[email protected]
+263771 076 520
- purpose of the study
- type of data
- nature of the population
Describe the population attributes that are known ; the size of the population,
the size of the sample, justification of the sample size.
what sampling design best suited the condition i.e. the nature and spread of the
population, time and other resources. Describe the design and show what steps you
followed to achieve the desired sample size.
Describe procedures and considerations about instrumentation. Say how the instrument
came about. Describe the attributes of the instrument came about. Describe the
attributes of the instrument. Show the types of validity determined and the method used
for determining instrument reliability .indicate the role of pilot study
Describe how data were collected, using other people, postal, interview etc.
Data analysis
In data analysis the researcher picks out the highlights from the displayed
data i.e. describe in the text the key findings. Description to show the
significance of the statistical measures used.
Data Interpretation
CHAPTER IV
The key word in chapter iii is: replication in other words the methods chapter
must include a complete description of your research design so that your
Diploma in Cyber Security Management
Mr Sengu James
[email protected]
+263771 076 520
research can be replicated. (i.e. Duplicated) by someone else. Given that
emphasis, it only make sense that the key word for chapter IV would be
‘follow-through’
When you adopt the first alternative you will end up with six chapters i.e. chapter iv for
data presentation and Analysis, Chapter V for data Interpretation ,or discussion of
Findings then Chapter VI becomes summary, Conclusions and recommendations. If you
adopt the second alternative the report will carry five chapters : Chapter IV N Data
Presentation, Analysis and interpretation, and Chapter V in summary, Conclusions and
Recommendations. However it should be noted that the Evaluation and theoretical case
study are characterized by six chapters even though one adopts the second alternative.
Chapter IV is a critical Chapter. All the three chapter s have been leading to this chapter.
It is the climax of your efforts. The major issues in this chapter are that data gathered in
the course of the study are presented,analysed and interpreted.
You should write this chapter so clearly that what you are doing is evident.
DATA PRESENTATION
Data presentation shows how data will be displayed. Some of the methods of data
presentations are tables, graphs, pie charts, bar graphs and pictograms. The writer
should justify the methods adopted method and usually it is the type of data that
determines the method. Data presentation should also indicate the measures employed
such as frequency counts, percentages, cumulative frequencies etc
The computer tends to show relevant statistical measures such as mean, variance,
standard deviation (SD), Chi – square, significance measures-values etc.
Data presentation provides a vivid picture of the phenomenon (or part of it) under
investigation.
In order to understand the nature of the population data that described certain attributes
of interest were collected and are on table 1,which contains the frequency and
percentage distribution of selected demographic characteristics of the sample.
Table:
NOTE: DATA on all personal attributes should be presented on one table to enhance,
at a glance , a holistic picture about the characteristics of the group. allocating a table for
each variable tends to obscure such a vivid and holistic meaning.
ANALYSIS
According to Table 1 N more females (656 or 57,4%) participated than males (486 or
42,6%) , with the exception of professional courses, a finding which suggests that males
and females were nearly equally motivated by the need for professional development.
Older students (147 or 35%) participated with greater frequency on enrichment courses
while a large proportion (105 or 25 102%) of younger students participated in
professional courses. For the total sample (1142) ,mean age was 42 years ,median age
was 40 years. In terms of ethnicity, the study reflected a composition unique to Hawaii,,
with a majority of participants (1005 or 88%). Categorizing themselves as being either
Asia (584 or 51,1%) or White (343 or 30%). Participants in all groups tended to be
relatively highly educated, most with at least some college experience.
NOTE:
The tables set out the quantitative data, while the text (analysis) picks out the
highlights. Keep tables simple.
It is also worth remembering that the eye follows the vertical column more
easily than the horizontal . Thus whenever possible tables should be arranged
so that items of greatest concern appear in the vertical column.
Where base numbers of frequencies are used the percentages should always
be provided unless the samples size is less than 30. Why, the use of
percentages when the base numbers are small tends to exaggerate quantities.
All tables should be numbered in a continuous series throughout the chapters.
Also, since each table must be meaningful on its own, every table or graph must
have a clear and appropriate caption, and all the columns and rows must be
appropriately labeled. These captions and labels should be kept as brief and
simple as possible.
Apart from tables, other forms of graphic presentation, such as graphs or
histograms, may be appropriate. Many of the point made about tables also
apply,mutatis mutandis,to these. In general, one should avoid giving the same
information in different forms such as tables, a graph and a histogram . Instead,
one should decide which presentation is the most effective and informative, or
use different forms to facilitate interpretation of separate aspect of the analyses.
Diploma in Cyber Security Management
Mr Sengu James
[email protected]
+263771 076 520
INTERPRETATION:
NOTE
The study objective always determines the subheading for the subject to be
addressed.
The above objective is borrowed from a study ‘An invest9igation into Ethical
Dilemmas Facing Army education Corps Administrators and Instructors Implications
for a Need for a Professional Ethics (J. Tshuma, 1996: Unpublished Dessertation,
University of Zimbabwe)
Subheading
Introduction
N=120
N=45
ANALYSIS
NOTE
NB: - data analysis is data bound i.e. presented data set the parameters for data
analysis and nothing outside what is displayed /presented should be described.
Avoid use of value terms like just only but the researcher was taken aback by..
This means the analysis should be free of researcher’s bias and subjectivity. Avoid
thinking by heart ,use rationality and objective reason.
INTERPRETATION
The conceptual framework of the study hypothesis was Kohberg,s (1964) Post
Convential Level Theory of Moral development. This level of moral development
entails a clear effort of define moral values and principles that have validity and
application apart from the authority of the groups or people holding these principles
And apart from the authority of the groups or people holding these principles and
apart from the individual’s own identification with these groups. Sage 6 of this level
N The Universal N Ethical N Principle Orientation N views right as defined by the
decision of conscience in accord with self chosen ethical principles appealing to
logical comprehensiveness university and consistency. These principles are
abstract an ethical, they are not concrete” (Kohberg: 1971:164). At least these are
universal for dignity of human beings as individual persons.
NOTE: The extensive citation of Kohl berg ,s theory is meant to put into picture of
what it constitutes. In most cases citation of sources should be as brief as possible
N usually just on statement N because a Full account is readily available in the
literature review chapter.
Findings related to the first objective of the study show that their training(39
administrators and 51 instructors) as teachers was the major source of their
knowledge of ethics of the teaching profession. This finding is questionable on the
basis that on the basis that a review of certificate/Diploma in Education as well as
programmes like Zimbabwe further Education Teacher’s certificate Diploma in
Adult Education or undergraduate degree programmes does not contain content on
ethics of the teaching profession. This observation tends to discredit the finding
that professional training is relied upon as a source for making judgment to resolve
ethical dilemmas.
The limitations of the data collection instrument tends to surface when interpreting
the findings of the third objective of the study. To identify sources of ethical
judgment to resolve ethical dilemmas resolved were not established, thus making it
difficult to ascertain the validity of the instrument. This should be borne in mind in
case someone wants to replicate the study, especially when using the question are
as a data collection instrument.
Note:
CHAPTER 5
SUMMARY
Diploma in Cyber Security Management
Mr Sengu James
[email protected]
+263771 076 520
IT starts with the statement of the problem and highlights the hypothesis, study
objectives, methodology and summary of findings (which should indicate the
frequencies/percentages of responses).
CONCLUSIONS
The conclusions focuses whether the study objectives were not met or not ,whether
the hypothesis was confirmed and generalizability to broader situations.
RECOMMENDATIONS
Recommendations addresses the “so what” questions i.e. ‘what do your study
results mean to the real world for Adult Education practice? They also indicate how
the findings of the study should be disseminated to appropriate users.
Recommendations are based on study findings and conclusions and an attempt
should be made to avoid overzealous, exaggerated, sweeping and baseless
statements. They should be guided by the representative ness of your study
sample.
Detail the hypothesized and unforeseen limitations and how they or might have
affected the results of the study. Speculate on what could have been if the study
had been conducted under the best of all possible world conditions. Here you are
attempting to let future researchers know about what they should try to overcome if
they want to replicate the study build on it.
REFERENCE /BIBLIOGRAPHY
References are those published or unpublished materials that have been cited
in the text. Bibliography is all the material that have referred to in the course of
the study but not necessarily mentioned in the text. References reflect more
honesties. Whether you have References or Bibliography, the material must be
arranged in alphabetical order. Follow the general rules of setting out
Bibliographical data.
APPENDICES
After the Reference and Bibliography comes the Appendix section. All
appendices must be numbered separately and headed
appropriately .Appendices contain back up information which the reader may
need to refer to but does not require in order to understand the text.
Appendices should not be end to the chapter.
GENERAL
Your report read smoothly from page 1 to page xyz. It must tell a story which is
clear precise, informative and easy to read. Therefore avoid long winding
sentences, flowery or ambiguous phrases. A report should never be written all
at once from chapter 1 to IV as if it is letter: If it is written that way, it usually
lacks direction and fineness.
When you have put your report together ,you need to have a draft typed in 1,5
spaces. This is your companion. A good report will have been read at least
FIVE times before submission.
Read for spelling ,grammar, for sense and for over impression. Ask yourself ;
Have you said anything twice ? (the sin of repetition ),Have you left out
something ? (the sin of commission),Have you said something in a way you
cannot quite understand? (the sin of ambiguity) or Have you something that
you would not read? (the sin of boredom)
AVOID THESE FIVE DEADLY SINS
Diploma in Cyber Security Management
Mr Sengu James
[email protected]
+263771 076 520
REFERENCES, BIBLIOGRAPHIES AND QUOTATION
The writing of essays is a major part of one’s studies and therefore calls for careful
planning and presentation. The sources of material should be clearly shown and
traceable.
SOURCES OF MATERIAL
There are two sources of material N primary and secondary. Primary sources are
based on the first hand accounts, reflections or statements. In written form they may be
official document, e.g. annual reports. policing documents, parliamentary debates,
diaries and letters. The primary sources may be published or unpublished.
Secondary sources and may be in the form of journal articles or books. They may be
published or unpublished as in the case of dissertation and theses.
The difference between these two categories should be clarified when used in essays
and papers
All work that is taken from primary or secondary sources,i.e not one’s own, should be
acknowledged. Barzun and Graff(1970) have this to say about quotations;
“The best habit of quoting in nearly every kind of printed and spoken matter and rates for
doing so are quite recent developments. Formerly,the practice was limited to scholars
and was taken asa a sign of the original timid, pedantic mind”However , as many
school;ars have not only misquoted and altered the sense as they repeated quotations
Barzun and Graff(1970) add that:
“.your essay , your book shoud be primarily your work and your word . . If (at the
of it all ) you have not made other people’s knowledge your own by mixing it with
your thoughts and and your labour of re-composition,you are not a writer but a
compile, you have not written a report but done a scissors N and paste job.
The use quotations, like writing a good essay, are a art. Quotations should be
used to illustrate points and not as proof. They should be used to augment your
argument. Quotations should be kept short and made to blend and merge into
the trend of thought of the text. A quotation should always contain not only the
exact words but the punctuation marks as well. In other words all quoted material
should be in inverted commas.
Diploma in Cyber Security Management
Mr Sengu James
[email protected]
+263771 076 520
The author’s surname and the date should always appear either before or after
the quotation. In many cases, the page of the publication should appea as well in
the text.
Examples
(a) Quoting author, year and page at the beginning
Meir (1976:519) says The economic quality of the population remains low
where there is little knowledge of what natural resources are available.
Paragraphing
Example
Banks (1975) noted that oral interviews with a group of people sometimes
yielded information of corroborative or consensus type, which was more
reliable than individual interviews, would be.
Footnotes
These are notes (usually) in smaller print) that are inserted at the bottom of the
page to explain certain aspects contained on that particular page. Raised
numbers (2)………are used in the text and correspond with numbered
explanations at the bottom. Normally footnotes are used not only to reference
material but to give explanations that might not be relevant if included in the text.
A list of references that have been used in the text should be set out at the end of
the paper/book before appendices, tables or indices.
Diploma in Cyber Security Management
Mr Sengu James
[email protected]
+263771 076 520
The reference should be listed in alphabetical order using the author’s names .
here are examples of how to set out such references.
An article in a journal
Sleman G ~ there are only four Dogs in china “Convergence vol. VIL No 3
1974, page 8
Note: the title of chapter/paper is not underlined; the author’s names are not
inverted and the abbreviation ‘ed’ is used to indicate ‘editors’.
A second reference immediately after the first reference same book,same author:
Ibid page
Second reference following reference not immediately after last in the same book
and same author:
There are several book sin paint deal in various details on how to write essays.
These books cover all the points discussed in this handout and many more.A
short list of references and writing) Brace and World Inc.Harcourt 1970.
REFENCES
Marking Guide
Abstract
- Is it brief? 1
- Is it comprehensive summary of the
project? 1
- Does it conform to the title? 1
Introduction
- Does it state the problem or issue of
concern in the first two sentences?
½
- Is the existence of the problem
Diploma in Cyber Security Management
Mr Sengu James
[email protected]
+263771 076 520
supported by documentary evidence? ½
Delimitations
- Are the physical and conceptual
boundaries of the study clearly
defined? 1
- Is the scope of the study clear?
1
Definitions of terms
- Are the terms adequately defined
1
Organization of the study
- Is the number of chapters in the
study given?
Diploma in Cyber Security Management
Mr Sengu James
[email protected]
+263771 076 520
- Does this synthesise Chapter 1 and ½
outlines what follows in the remaining
chapters? ½
Introduction
- Does it tell what the chapter deals
with?
- Are main issues of the chapter 1
outlined?
- Are reasons for reviewing literature 1
given?
Conceptual framework
- Are key variables explained in the 1
context of the current study?
- Does the review address any major 1
concepts and issues of the study?
- Does it address relevant 2
methodological issues?
Theoretical framework
- Is the theory behind the problem 1
identified and discussed?
- Does the discussion focus on how
the theory tries to explain the 1
problem under the study?
- Does it address relevant 1
methodological issues?
- Are strengths and weaknesses of the 2
theory discussed?
Introduction
- Does it tell the reader what the ½
chapter deals with?
Research design
- Is the design appropriate to the 1
solution of the problem?
- Are the advantages and
disadvantages of the design 1
discussed and solutions to the
disadvantages highlighted?
Methodology
- Are the research instruments to be 1
used identified and described?
- Are the strengths and weaknesses of
using the research instruments
described? 1
- Measures to overcome these
weaknesses should be suggested? ½
- Are the instruments appropriate for
the problem? ½
The population
Diploma in Cyber Security Management
Mr Sengu James
[email protected]
+263771 076 520
- Is the target population described? 1
Sampling
- Is the sample described and
justified? ½
- Are the sampling methods
described? 1
Summary
- Are concerns of the chapter
summarized? ½
- Is the next chapter introduced? ½
Introduction
- Does it tell what the chapter deals
with? ½
- Is the total number of subjects given
and expressed as a percentage? 1½
Data presentation
- Are tables, figures etc well laid out?
- Are they centred, numbered and 4
given appropriate tittles?
3
Data interpretation
- Is the interpretation of data clear,
meaningful and relevant to the main
research question? 5
- Is the interpretation qualitatively
organized? 2
Summary
- Are the main concepts of the chapter ½
summarized? ½
- Is the next chapter introduced?
CHAPTER V: SUMMARY,
CONCLUSION AND
RECOMMENDATIONS
Introduction
- Does it outline what the chapter deals
1
with?
Summary
- Are all the major findings of the
2
research outlined?
- Are the findings covering all the sub
2
questions?
- Is the most important findings of the
1
study highlighted?
-
Conclusion
- Is the answer to the main research 2
question presented?
- Is there any relationship between the ½
findings and theory shown?
- Are conclusions made relevant and ½
appropriate?
- Are the conclusions drawn with direct 2
reference to the objectives of the
study?
Recommendations 1
- Are recommendations clearly stated
- Are suggestions for improvement 1
presented?
- Are the suggestions reasonable and 1
appropriate?
Diploma in Cyber Security Management
Mr Sengu James
[email protected]
+263771 076 520
OTHER ASPECTS
- Overall appearances
- Reference [author, date, title, 2
place, publisher] 3
- Appendices
2
Total 100