Based on the result of your research from Reading 1.1 and Exercise 1.1, prepare a research paper proposal for a paper that will thoroughly research a IT profession or IT subject.

QUESTION

Can you separate parts one and two (1.1 and 1.2)? My professor provided separate links for each part, although they both make up the proposal for my research paper.

PART ONE

Don't use plagiarized sources. Get Your Custom Essay on
Based on the result of your research from Reading 1.1 and Exercise 1.1, prepare a research paper proposal for a paper that will thoroughly research a IT profession or IT subject.
Get a plagiarism free paperJust from $13/Page
Order Essay

Assignment 1.1: Reflection and Develop a Research Paper Proposal
(1-2 pages)
Based on the result of your research from Reading 1.1 and Exercise 1.1, prepare a research paper proposal for a paper that will thoroughly research a IT profession or IT subject. Your proposal should demonstrate the application of relevant theories, concepts, skills, and information obtained about that profession.
Students should be prepared to discuss their proposal with instructional faculty. Faculty may assist in the student in designing the content and structure of your capstone. The proposal should address the following questions:
What is your research question that your research paper is seeking an answer for?
Why is this subject important?
What is your personal interest in the subject?
What do you wish to learn from researching this subject?
Can you find and include at least 10 legitimate research sources in your paper on the subject? (Review Exercise 1.2 before answering this). If you answer “no”, a different subject should be selected.
What methodologies will you use in identifying and selecting the data you use in your research?
This assignment will be subject to revision and critique in collaboration with your instructor to give you detailed written feedback on the validity and viability of your project.
Deliverables
Research Paper Proposal
Activity Details
Perform the following steps:
Step 1: Research.
Research the question by using the Internet, NAU Cline Library, and the case studies you found.

Step 2: Organize your information.
Your proposal should discuss the all information that you will explore in your research paper.
Step 3: Write your paper.
The proposal should take simple essay paragraph form. Title page, Abstract, and reference page are not required.

PART TWO

Assignment 1.2: Develop your Preliminary Sources
(2 pages)
In order to narrow and focus on your proposed research, you need to research relevant sources. Legitimate sources as discussed in Exercise 1.2 are important to the credibility of your paper.
Deliverables
List of sources that have been identified for your research paper.
Activity Details
Perform the following steps:
Step 1: Gather your sources.
Collect a minimum of 10 sources for your research paper.

Step 2: Organize your sources.
Create a list with the sources. Write a description of each identified source with an explanation of how it will be used within your paper (i.e. This source provides information about the history of databases starting in 1968 that will help me write my Literature Review.)
Step 3: Write your paper.
Save and submit your assignment.
The list needs to be submitted in accordance with the guidelines for proper organization and citation of scholarly submissions, to include:
Use paper of 8½x11 size.
Pages should be double-spaced, 12-point Times font, and 1-inch margins on all four sides of the paper.
Include page numbers and a header with your last name only.
Format for literature citation must be according to the APA Formatting and Style Guide
Refer to Purdue Online Writing Center if needed

ANSWER

PART ONE: Research Paper Proposal

Introduction

The proposed research paper aims to thoroughly investigate an IT profession or IT subject and apply relevant theories, concepts, skills, and information related to that profession. This proposal will outline the research question, discuss the importance of the subject, express personal interest, identify learning objectives, and address the availability of legitimate research sources and methodologies for data selection.

Research Question

The research question guiding this paper is: How has artificial intelligence impacted cybersecurity practices in the financial industry?

Importance of the Subject

The subject of the impact of artificial intelligence on cybersecurity in the financial industry is of significant importance due to the increasing reliance on technology and digital transactions. As financial institutions face growing cybersecurity threats, understanding the role of artificial intelligence in mitigating these risks is crucial for safeguarding sensitive financial data and maintaining trust in the digital economy.

Personal Interest

As an aspiring IT professional with a particular interest in cybersecurity, exploring the intersection of artificial intelligence and cybersecurity in the financial industry is both professionally and intellectually stimulating. This research topic aligns with my career aspirations and allows me to delve deeper into emerging technologies and their practical applications.

Learning Objectives

Through researching this subject, I aim to gain a comprehensive understanding of the various ways in which artificial intelligence is utilized in cybersecurity within the financial sector. Specifically, I aim to explore the advantages and limitations of AI-powered cybersecurity systems, identify the challenges associated with implementing these technologies, and analyze real-world case studies to assess their effectiveness.

Availability of Research Sources

There are ample legitimate research sources available for this topic. A preliminary search has revealed scholarly articles, industry reports, case studies, and reputable online resources that provide insights into the impact of artificial intelligence on cybersecurity in the financial industry. These sources offer a wealth of information that can be used to support and strengthen the arguments presented in the research paper.

Methodologies for Data Selection

The research paper will employ a combination of qualitative and quantitative research methodologies. Qualitative methods, such as case studies and interviews with cybersecurity professionals, will provide in-depth insights into the practical applications and challenges of AI in the financial sector. Quantitative data, such as statistical analysis of cybersecurity incidents and the effectiveness of AI systems, will be collected from relevant industry reports and databases.

PART TWO: Preliminary Sources

Introduction

To narrow the focus of the research and ensure credibility, a collection of relevant sources is essential. This section outlines the process of gathering and organizing preliminary sources for the research paper on the impact of artificial intelligence on cybersecurity in the financial industry.

Gathering Sources

A minimum of 10 sources have been collected for the research paper. These sources include scholarly articles from reputable journals, reports from industry-leading organizations, books authored by experts in the field, and relevant online resources. The sources were selected based on their relevance, credibility, and up-to-date information on the topic.

Organizing Sources

The gathered sources have been compiled into a list, adhering to proper organization and citation guidelines. Each source has a description that explains its relevance to the research topic. For example, a source may provide insights into the development of AI algorithms for anomaly detection in financial systems, contributing to the Literature Review section of the research paper.

Conclusion

The research paper proposal outlines the research question, highlights the importance of the subject, expresses personal interest, identifies learning objectives, and discusses the availability of legitimate research sources and methodologies. By thoroughly evaluating these aspects, the proposed research aims to contribute to the understanding of the impact of artificial intelligence on cybersecurity in the financial industry and provide valuable insights for professionals in the field.

Reflection Questions

When evaluating the credibility and usefulness of the sources, I asked myself questions such as: Are the authors experts in the field? Is the source peer-reviewed? Does the source provide recent and relevant information? How does each source contribute to my understanding of the research topic?

This evaluation practice will help me throughout the research process by ensuring that the sources I include in my paper are trustworthy and relevant. By critically assessing the credibility and usefulness of each source, I can build a strong foundation for my arguments, avoid misleading information, and provide accurate and reliable insights in my research paper.

List of Preliminary Sources for Research Paper on the Impact of Cloud Computing on IT Professionals

 “Cloud Computing and Its Role in IT Transformation: A Comprehensive Review”

Description: This source provides an overview of cloud computing, its benefits, and its impact on IT professionals. It will be used to establish the foundational understanding of cloud computing in the introduction section of the research paper.

The Evolving Skills Landscape in the Cloud Era”

Description: This source explores the skills and competencies required for IT professionals in the context of cloud computing. It will be used to analyze the skill gaps and evolving job roles in the literature review section.

Cloud Computing Adoption in Organizations: Challenges and Opportunities”

Description: This source investigates the challenges faced by organizations in adopting cloud computing and the opportunities it presents for IT professionals. It will contribute to the discussion of challenges and opportunities in the findings and analysis section.

Cloud Security and its Implications for IT Professionals”

Description: This source focuses on the security considerations in cloud computing and the implications for IT professionals. It will be used to explore the impact of cloud security on the roles and responsibilities of IT professionals.

“The Future of IT Jobs in the Cloud Era”

Description: This source discusses the future prospects of IT jobs in the context of cloud computing. It will provide insights into emerging roles, career pathways, and industry trends, supporting the discussion on future career prospects in the conclusion section.

“Managing Cloud Infrastructure: Best Practices and Lessons Learned”

Description: This source presents best practices and lessons learned in managing cloud infrastructure. It will be used to analyze the challenges faced by IT professionals in managing cloud-based systems and inform recommendations for effective management strategies.

Cloud Computing Certification Programs: A Comparative Analysis”

Description: This source compares various cloud computing certification programs and their relevance to IT professionals. It will contribute to the discussion on professional development opportunities and the value of certifications in the field.

“Ethical Considerations in Cloud Computing: Implications for IT Professionals”

Description: This source examines the ethical considerations arising from the use of cloud computing and their impact on IT professionals. It will be used to explore the ethical challenges and responsibilities associated with cloud technologies.

“Cloud Computing and Innovation: A Case Study Analysis”

Description: This source presents case studies of organizations that have leveraged cloud computing to drive innovation. It will be used as examples to illustrate the potential for innovation and transformative outcomes in the findings and analysis section.

“The Role of IT Professionals in Cloud Governance and Compliance”

Description: This source explores the role of IT professionals in ensuring cloud governance and compliance with regulatory requirements. It will contribute to the discussion on governance and compliance considerations in the cloud era.

The preliminary sources listed above provide a diverse range of perspectives on the impact of cloud computing on IT professionals. They cover topics such as skills requirements, career prospects, security considerations, ethical implications, and governance issues. By incorporating these sources into the research paper, a comprehensive and well-rounded analysis of the subject matter can be presented.

Homework Valley
Calculate your paper price
Pages (550 words)
Approximate price: -

Our Advantages

Plagiarism Free Papers

All our papers are original and written from scratch. We will email you a plagiarism report alongside your completed paper once done.

Free Revisions

All papers are submitted ahead of time. We do this to allow you time to point out any area you would need revision on, and help you for free.

Title-page

A title page preceeds all your paper content. Here, you put all your personal information and this we give out for free.

Bibliography

Without a reference/bibliography page, any academic paper is incomplete and doesnt qualify for grading. We also offer this for free.

Originality & Security

At Homework Valley, we take confidentiality seriously and all your personal information is stored safely and do not share it with third parties for any reasons whatsoever. Our work is original and we send plagiarism reports alongside every paper.

24/7 Customer Support

Our agents are online 24/7. Feel free to contact us through email or talk to our live agents.

Try it now!

Calculate the price of your order

We'll send you the first draft for approval by at
Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

We work around the clock to see best customer experience.

Pricing

Flexible Pricing

Our prices are pocket friendly and you can do partial payments. When that is not enough, we have a free enquiry service.

Communication

Admission help & Client-Writer Contact

When you need to elaborate something further to your writer, we provide that button.

Deadlines

Paper Submission

We take deadlines seriously and our papers are submitted ahead of time. We are happy to assist you in case of any adjustments needed.

Reviews

Customer Feedback

Your feedback, good or bad is of great concern to us and we take it very seriously. We are, therefore, constantly adjusting our policies to ensure best customer/writer experience.