Topic: Organizational IT security management Strategy

    

Topic: Organizational IT security management Strategy 

  1. Background: Describe the issue, discuss the problem, and elaborate on any previous attempts to examine that issue.
     
  2. Research Questions: In your identified problem area that you are discussing, what were the research questions that were asked?
     
  3. Methodology: What approach did the researcher use, qualitative, quantitative, survey, case study? Describe the population that was chosen.
     
  4. Data Analysis: What were some of the findings, for example, if there were any hypotheses asked, were they supported?
     
  5. Conclusions: What was the conclusion of any data collections, e.g., were research questions answered, were hypotheses supported?
     
  6. Discussion: Here you can expand on the research and what the big picture means, how do the results found in the literature review help organizations in the Information Technology strategy planning. What do you see as long-term impacts and what further research could be done in the field
     
Tags: No tags