Description
W3: Independent and Dependent Variables
undefined
Subscribe
Discussion Points:
1. Share your problem statement for your research
2. Share your purpose statement for your research
3. Share the significance of your study
4. What are your independent and dependent variables?
5. Provide your research questions (at least two)
6. Convert your research questions to hypotheses (at least one null hypothesis and one alternative hypothesis; the hypothesis is a statement and not a question)
7. Provide a list of five scholarly articles
Research Questions and Hypothesis
What is a Scholarly Article
Discussion of Research Methods, Independent-dependent variables Transcript Below
A research study means formulating a model based on data or observations, to see if you can predict future outcomes based on different data or new observations. Sometimes the model is quantitative, relying on mathematics. Other times, the model is qualitative, relying on comparisons or evidence and observations showing a relationship.
undefined
W3: Independent and Dependent Variables
Discussion Points:
1. Share your problem statement for your research
2. Share your purpose statement for your research
3. Share the significance of your study
4. What are your independent and dependent variables?
5. Provide your research questions (at least two)
6. Convert your research questions to hypotheses (at least one null
hypothesis and one alternative hypothesis; the hypothesis is a statement
and not a question)
7. Provide a list of five scholarly articles
•
•
Research Questions and Hypothesis
What is a Scholarly Article
Discussion of Research Methods, Independent-dependent
variables Transcript Below
Week 3 – Kumar Chapt 4,5,6,7
Chapter 4 – Research is intended to draw conclusions about a
general subject or population based on data taken from a
smaller sample. The larger the sample, the more reliable the
conclusions.
A research study means formulating a model based on data
or observations, to see if you can predict future outcomes
based on different data or new observations. Sometimes the
model is quantitative, relying on mathematics. Other times,
the model is qualitative, relying on comparisons or evidence
and observations showing a relationship.
Sometimes there is difficulty when trying to formulate a
question, opinion (or hypothesis) into a researchable
problem. Formulating the research is like creating the
foundation for a building. You should choose a topic which
interests you, and which motivates you, since the research
itself will be time-consuming.
You must narrow-down the
scope of the topic so that you can finish the work within the
allotted time. The topic should be specific. If you choose a
topic that is too broad, or too vague, you may not be able to
finish your work by the end date, and your work will show
that you are not finished. When you choose a concept for
research, you must be clear about what exactly will be
measured so that it will clearly relate to your hypothesis. If
you are working with data, you must determine early in your
work whether data is actually available to you. If you are
working with a population, you must be careful to avoid
adverse reactions from the subjects, who may also be
reluctant to share information, or who may be upset by being
the subject of an examination. You should have some
familiarity with the research topic. You must know if
sufficient scholarly literature exists that will help support
your research.
Follow the steps listed in Chapter 4 of Kumar.
Identify the field that interests you
Dissect the broad into narrowly-defined s aspects
Select the narrow aspect that is most interesting
What do you want to find out? What is the research
question?
5. Formulate objectives – Use phrases such as “…to find out..â€Â,
or “..to determine..â€Â
6. Are your objectives feasible? Do you have the time, the
resources to finish?
7. Double-check yourself on the above answers
1.
2.
3.
4.
Look at Kumar examples 1, 2 and 3 in chapter 4. What is
the makeup, or characteristics of your study
population? What are the characteristics that may separate
your study population from the global population of possible
respondents? Is your sample population representative of
the total population? What are the measurements you want
to observe? You must also remove ambiguity from your
definitions and from your methods for research.
Chapter 5 – A Variable is a concept that can take on a value
that can serve as a measurement. Variable values can be
numeric, or that can be discreet (A or B, Hi-MediumLow). By deciding on the values to be measured, you are
operationalizing the concept being examined.
An independent variable can stand alone, does not depend
on anything else to get its value (red light or green light). A
dependent variable relies on another variable to receive its
value (moving or stopped). The researcher creates, or
theorizes, a model of reality and tests it by manipulating the
independent variable and then measuring the dependent
variable to see the effect. Does the model demonstrate
whether the dependent variable increases or decreases as
the independent variable is increased or decreased by the
researcher? (see Hughes Chapter 4).
Discussion Guidelines.
Graduate Discussion Rubric:
Rubric for Learner Posts
Points
Synthesis of concepts in 500 or more words (critical to class
performance)
Applications of personal experience
Writing standards
Response to two or more students 200 words or More
Timeliness: (10% deduction) Optional
30
20
10
40
0
Running head: ARTIFICIAL INTELLIGENCE IN CYBERSECURITY
Application of Artificial Intelligence in Cyber Security
1
ARTIFICIAL INTELLIGENCE IN CYBERSECURITY
2
Application of Artificial Intelligence in Cyber Security
The keywords used for the research are computer crime, malware, machine learning,
cybersecurity, cyber-attacks, artificial intelligence, expert system, neural nets, and intelligence
agent. The research problem was the possibility of artificial intelligence taking over the
cybersecurity industry. The research topic variables include cyber threats, artificial intelligence
awareness, cost, and technology advancement. An increase in cyber threats, awareness of
artificial intelligence, and technology advancement will lead to increased use of AI in
cybersecurity. On the other hand, the cost variable is inversely proportional to the increase in AI
applications in cybersecurity. Other variables include infrastructure and resource availability and
cybersecurity policies. The research hypothesis was “artificial intelligence will take over the
cybersecurity industry by 2030.” The research was done on a positive hypothesis because only
one direction is practically meaningful and likely expected. The questions I would consider about
the topic include the possibility of AI’s failure in solving cyber security threats and whether AI
can completely replace traditional cybersecurity solutions.
The research topic was the application of artificial intelligence in cybersecurity.
Cybersecurity is a popular discipline because threats are rising, and cybercriminals are trying all
tricks to ensure they are ahead of law enforcement. On the other hand, the world is rapidly going
digital, with almost every activity getting computerized. Therefore, I chose the research topic
because of its relevance today, and the possibility of applying the research findings in the future
is high. This is a research area that has not been fully explored, and its future is promising. I
realized that AI techniques are being employed in cybersecurity today to replace the traditional
ARTIFICIAL INTELLIGENCE IN CYBERSECURITY
3
cybersecurity solutions, which have been ineffective in preventing and mitigating emerging
cyber threats. In particular, machine learning and deep learning are promising AI technologies
that will help cybersecurity experts prevent and mitigate ever-increasing threats (Zeadally et al.,
2020). Additionally, artificial intelligence is being used across major industries because data
collection and storage capabilities are increasing. With the increase in data being handled across
different networks, the threats that result from the large data volume handling and increased
traffic across networks have also increased (Bhutada & Bhutada, 2018). This means that the area
of study is extensive and promising because it is expanding every day.
The challenges that I faced in the web research searches include duplicate hosts and web
search spam. The duplicate host problem is prevalent in many web searches where the web user
finds duplicate content in multiple locations (URLs), and the search engines cannot know which
URL to show in the search results. The general non-APUS library source was affected by this
problem, and I was greatly inconvenienced because I had to visit various hosts to locate the
correct article. The web search spam problem involved having authors who deliberately
manipulate their ranking in the search engines so that the content appears in the top 10 search
results. This problem was inconveniencing because I found content that appeared on the top 10
search results, but it was not relevant to the search topic. Spam can be web-based or link-based,
depending on what is being spammed. Sometimes, the search engine keywords gave too many
search results, and I had to review all of them to get the most relevant and accurate one.
ARTIFICIAL INTELLIGENCE IN CYBERSECURITY
4
References
Bhutada, S., & Bhutada, P. (2018). Applications of Artificial Intelligence in Cyber
Security. International journal of engineering research in computer science and
engineering, 5(4), 214-219.
Zeadally, S., Adi, E., Baig, Z., & Khan, I. A. (2020). Harnessing artificial intelligence
capabilities to improve cybersecurity. Ieee Access, 8, 23817-23837.
Purchase answer to see full
attachment