Ongoing Aims
- Install and try out Vulnerable Mobile Applications
- Find papers and start Lit Review - Started
- Decide on Research method for final pathway - Completed
- Plan Introduction - Started
- Create Basic Dissertation Layout - Completed
--------------------------------------------------------------------------------------------------------------------------
It's been a while since my last blog as Friday was my birthday and the celebrations went on all weekend. This blog revolves around the work completed yesterday and today.
Yesterday I was very focused on laying the foundations for my dissertation. By reading through past dissertations and looking at the structures theirs took i was able to lay the foundations for my dissertation and plan out various sections.
The main sections planned out and given headers were the Introduction and Lit Review.
The introduction was split into:
- Problem Statement
- Project Scope
- Intended Audience
- Project Objectives
- Why the project is honours worthy
Today and tomorrow will be spent bullet pointing out key points that i feel should be included in these sections. This will help when it comes to writing as it'll act as a reminder to any thoughts i had early on.
The Lit review was split into a few sections which need to be discussed with my project tutor:
- Mobile Application Security
- This section will be used to give an overview on mobile application security, and vulnerabilities that occur in mobile devices. there will also be a brief section discussing android vs iOS vs Windows mobile in which the various benefits and disadvantages of the platforms are outlined
- Risk Analysis
- This section will focus on how to perform a risk analysis, it will also have a sub section on Architecture level risk analysis. I will take a look at various risk frameworks and see if they can be incorporated in my paper.
- Mobile Protection
- This section will discuss various techniques for securing mobile platforms. Most of the protection will be application based, but i'll also go into some detail regarding other ways of non app based security.
These sections and sub sections need to be agreed upon with my tutor, but until they are i've spent today gathering various articles and journals on all areas covered in the lit review. To gather the articles and store their references i've used End Note basic. End note was an application I hadn't previously used before so i spent some of today learning how to use it's interface and how to import references from various websites such as science direct and google scholar.
The articles i've gathered so far have been grouped used a function within end note, the articles are grouped using the sections and sub sections of the lit review. I did this so when it comes to writing the lit review I won't have to sift through all of my articles to find the one i need, i'll only have to look through a set few, so findings quotes and referencing will be much easier as i'll know the category i wish to make a point about so i can find a quote much easier.
On going work with the articles is my analysis of them as my trusted sources. At the moment I have around 9 articles and 5 trusted people that will all be used as my trusted sources. As i read through my articles this list will continue to grow until i have a healthy amount of articles. By Thursday I will hopefully have a completed list of trusted sources that have been analysed ready for my meeting with my project tutor.
The only articles i haven't gathered yet are ones specific to research methods, this will be completed by friday and i'll be able to start my lit review this weekend.
Thank you very much for reading!! Stayed tune for more. You Stay Classy Bournemouth.
Contact Info:
No comments:
Post a Comment