Dissertation (Major Computing Project)
Submit this Project Suggestion Form through Moodle
Coordinator’s Email: qahe.computingprojects@qa.com
Student Project Suggestions Form
Students must use this form to suggest a topic(s) for their Final Year Dissertation. It is important that each form is completed as much as possible and enough information is provided in the tables to enable the Dissertations’ Coordinator to judge the suitability of the Suggested topic(s) as a final year degree project based on the specifications of the course that you are studying. Once a topic suggestion is accepted a suitable supervisor will be assigned.
It is strongly advised that students prior to submitting their Project Suggestions Form undertake and complete the exercises on ‘Personal Reflection and Career Aspirations’ in Tutorial 1 and also consider the following issues:
- Self-evaluate where your strengths and weaknesses lie
- an area or topic that you have enjoyed during your studies and wish to focus on further
- a topic you would like to investigate and gain considerable understanding and knowledge
- area(s) you may be interested in specialising
- area(s) you may wish to gain employment in upon your graduation
- area(s) with high demand and potential for employment
All students must suggest at least 1 and not more than 2 different project topics. Suggest the topics in order of preference.
Once completed this form must be uploaded to Moodle via the link: ‘Project Suggestions Form’.
Please name your file as: StudentID-Surname-Firstname-Project-Suggestions-Form
Example of filename: B12345678-Ioannides-Nicholas-Project-Suggestions-Form
Student’s Details | |
Name | |
ID | |
University Email | |
Module Code |
Project Suggestion – Choice #1 | |
Area of Interest | Cyber security |
Indicative Title | Cloud security |
Description (200-300 words) | The Internet has become a center of development in the 21st century. In some countries, it is even a fundamental human right, and means are always created to make it easily accessible. Some large companies have also taken steps to make the Internet freely available to people. For example, Facebook teamed up with other global players to introduce internet.org, a project that provides free access to the Internet in Third World countries. With the expansion of the Internet, more work has been done to connect devices. This was required by the ubiquitous calculation. In addition, the idea of ensuring that everything could be connected led to the creation of the Internet of Things (IoT). Therefore, multiple devices or “objects” are connected, creating a high affinity for data storage. The storage space faces the latest innovations from the digital world. Cloud Computing introduced a solution providing Infrastructure as a Service (IaaS) as cloud storage. Since most companies are moving their technology to the cloud, security is the main issue that needs to be highlighted. This is because lack of proper security means that companies can lose valuable information to malicious people. Cloud computing is divided into two, Infrastructure as a service and a platform as a service. Both of these cloud services need security. The first way of ensuring that cloud security is safe is by encrypting information. This dissertation would look at data security in cloud storage. |
Methodology (100-200 words) | The method that would be used would be quantitative. Data would be collected from companies that use cloud storage services. The data includes how safe their data is compared to the local storage of data. Whether they have ever faced any data breach and how the data is reliable. The quantitative method is appropriate for this research since it involves data analysis, which will include analyzing the number of companies that prefer cloud computing. It would make it easier when recommending the best storage form of data, whether local or cloud computing. The data collection method also needs one on one meeting with the concerned companies. |
Deliverables | Reliability of data in cloud storage. |
Project Suggestion – Choice #2 | |
Area of Interest | Cybersecurity |
Indicative Title | Identity theft in the Internet |
Description (200-300 words) | Since the introduction of the Internet, hackers have found a platform to perform many crimes. The reason behind this is the loopholes of security among different platforms. One of the common crimes is identity theft. Identity theft entails taking a person’s information and using it for pretense. A good example is how someone can take a person’s credit card and be able to order goods online using the person’s information such as email or even use his or her image. In the recent past, there has been many cases of identity theft that have been reported. Though different agencies have tried to come up with different solutions to this vice. One of the solutions is educating the public on the need to protect their information. The could do so by logging out of their computers whenever they finish using it. This measures are not enough since fraudsters are developing new methods each day. This research would look at ways in which identity theft can be reduced using a technological approach. It would also recommend software that could be used to assist in identifying people who are behind theft in the Internet. The main aim is to significantly reduce the cases of identity theft.
|
Methodology (100-200 words) | The methodology used in this case would be quantitative research. It will involve interviewing people and also use of questionnaires. Participants would state whether they have ever encountered any identity theft over the Internet and how they were able to react. This data would then be analysed using the software called spss. It would determine the percentage of people who have been affected by identity theft. This will determine whether identity theft is on the rise or not. This would make it easier for the recommendation of that appropriate security option. Also cost is one of the main factor in choosing methodology of conducting research.
|
Deliverables | Rate of identity theft cases |