Two Approaches to Information Security Doctoral Research
Researchers embarking upon doctoral research in information security face numerous challenges at the commencement of their studies. Students often face confusion as they consider where to start and how to progress. The objectives of the research need to be clearly defined before commencing the proje...
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | Conference Paper |
| Published: |
IFIP TC11.8
2011
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/12497 |
| _version_ | 1848748092626567168 |
|---|---|
| author | Armstrong, Helen |
| author2 | Lynn Futcher |
| author_facet | Lynn Futcher Armstrong, Helen |
| author_sort | Armstrong, Helen |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | Researchers embarking upon doctoral research in information security face numerous challenges at the commencement of their studies. Students often face confusion as they consider where to start and how to progress. The objectives of the research need to be clearly defined before commencing the project. The research questions, methodology, data and analysis are inextricably tied to the objectives, and as such a top-down approach is recommended. This paper discusses two approaches to doctoral research, top-down and bottom-up. The paper is designed to guide students at the commencement of their information security doctoral research. These guidelines may also be of value to the supervisor. |
| first_indexed | 2025-11-14T06:59:33Z |
| format | Conference Paper |
| id | curtin-20.500.11937-12497 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T06:59:33Z |
| publishDate | 2011 |
| publisher | IFIP TC11.8 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-124972017-01-30T11:31:05Z Two Approaches to Information Security Doctoral Research Armstrong, Helen Lynn Futcher doctoral research information security education Researchers embarking upon doctoral research in information security face numerous challenges at the commencement of their studies. Students often face confusion as they consider where to start and how to progress. The objectives of the research need to be clearly defined before commencing the project. The research questions, methodology, data and analysis are inextricably tied to the objectives, and as such a top-down approach is recommended. This paper discusses two approaches to doctoral research, top-down and bottom-up. The paper is designed to guide students at the commencement of their information security doctoral research. These guidelines may also be of value to the supervisor. 2011 Conference Paper http://hdl.handle.net/20.500.11937/12497 IFIP TC11.8 restricted |
| spellingShingle | doctoral research information security education Armstrong, Helen Two Approaches to Information Security Doctoral Research |
| title | Two Approaches to Information Security Doctoral Research |
| title_full | Two Approaches to Information Security Doctoral Research |
| title_fullStr | Two Approaches to Information Security Doctoral Research |
| title_full_unstemmed | Two Approaches to Information Security Doctoral Research |
| title_short | Two Approaches to Information Security Doctoral Research |
| title_sort | two approaches to information security doctoral research |
| topic | doctoral research information security education |
| url | http://hdl.handle.net/20.500.11937/12497 |