Two Approaches to Information Security Doctoral Research

Researchers embarking upon doctoral research in information security face numerous challenges at the commencement of their studies. Students often face confusion as they consider where to start and how to progress. The objectives of the research need to be clearly defined before commencing the proje...

Full description

Bibliographic Details
Main Author: Armstrong, Helen
Other Authors: Lynn Futcher
Format: Conference Paper
Published: IFIP TC11.8 2011
Subjects:
Online Access:http://hdl.handle.net/20.500.11937/12497
_version_ 1848748092626567168
author Armstrong, Helen
author2 Lynn Futcher
author_facet Lynn Futcher
Armstrong, Helen
author_sort Armstrong, Helen
building Curtin Institutional Repository
collection Online Access
description Researchers embarking upon doctoral research in information security face numerous challenges at the commencement of their studies. Students often face confusion as they consider where to start and how to progress. The objectives of the research need to be clearly defined before commencing the project. The research questions, methodology, data and analysis are inextricably tied to the objectives, and as such a top-down approach is recommended. This paper discusses two approaches to doctoral research, top-down and bottom-up. The paper is designed to guide students at the commencement of their information security doctoral research. These guidelines may also be of value to the supervisor.
first_indexed 2025-11-14T06:59:33Z
format Conference Paper
id curtin-20.500.11937-12497
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T06:59:33Z
publishDate 2011
publisher IFIP TC11.8
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-124972017-01-30T11:31:05Z Two Approaches to Information Security Doctoral Research Armstrong, Helen Lynn Futcher doctoral research information security education Researchers embarking upon doctoral research in information security face numerous challenges at the commencement of their studies. Students often face confusion as they consider where to start and how to progress. The objectives of the research need to be clearly defined before commencing the project. The research questions, methodology, data and analysis are inextricably tied to the objectives, and as such a top-down approach is recommended. This paper discusses two approaches to doctoral research, top-down and bottom-up. The paper is designed to guide students at the commencement of their information security doctoral research. These guidelines may also be of value to the supervisor. 2011 Conference Paper http://hdl.handle.net/20.500.11937/12497 IFIP TC11.8 restricted
spellingShingle doctoral research
information security education
Armstrong, Helen
Two Approaches to Information Security Doctoral Research
title Two Approaches to Information Security Doctoral Research
title_full Two Approaches to Information Security Doctoral Research
title_fullStr Two Approaches to Information Security Doctoral Research
title_full_unstemmed Two Approaches to Information Security Doctoral Research
title_short Two Approaches to Information Security Doctoral Research
title_sort two approaches to information security doctoral research
topic doctoral research
information security education
url http://hdl.handle.net/20.500.11937/12497