Review #1: Emerging
Application of Technology (Consumer or Business).
This paper is the
first of two Technology Reviews that you will research and write for this
course. For this paper, you must choose an emerging application of technology
which is suitable for future use in a consumer-oriented product or service
(i.e. a new product for personal or home use) or a business-oriented product or
review papers will be used to prepare your technology selection paper for the
Analysis of Alternatives exercise later in the course. Your audience for these
papers is a group of senior executives who will be meeting to
decide which emerging technologies or emerging applications of technologies should
be selected for one or more
security-focused, Internal Research & Development projects during the next
budget cycle. Each of these
executives is responsible for a business area that will (a) develop products
which incorporate the emerging technologies or (b) depend upon such products to
support their organization’s operations.
For this paper, you will perform the
first three stages of the technology scan:
scanning is an evaluation model that is used when you need to develop a list of
candidate technology solutions. A technology scan can also be used when you
need to obtain information about the latest advancements in security products
technology scan has four stages: scoping, searching, evaluating, and
The scoping phase of this technology scan has already been
performed. Your scope is stages 3, 4, and early stage 5 as shown in the figure
To begin, select a
technology which is in the early-stage technology development, product
development or early production/marketing stages of the product lifecycle
(Stages 3, 4, or early stage 5 in the figure above). You may use news articles,
press releases, and government or company Web sites to help you find an
appropriate technology. (Remember to cite these sources in your paper.)
Technologies which are currently in
these stages include:
Big Data Analytics
Wearable Computing Devices (choose 1 specific
Physical Unclonable Functions (PUFs)
(devices & electrical circuits)
Dielectric thin films
Magneto-electric magnetic sensors
Neuromorphic computer chips
You are encouraged to look for and
investigate additional appropriate technologies before deciding upon your
technology choice for this assignment.
If you decide to research a technology
that is not on the suggested technologies list (see above), you must first
request and receive your instructor’s permission. Your instructor may require that you do
preliminary library searches for research papers and technical papers to prove
that you can find a sufficient number of resources to complete the assignment.
Survey of the
During your survey of the professional
literature, you will identify 10 research papers or technical papers which
provide technical information about your selected technology (see selection
requirements for each paper). These papers must be dated 2011, 2012, 2013, 2014,
or 2015 (five year window).
Allowable sources for research papers / technical papers are:
(a) professional journals, (b) conference proceedings, (c) dissertations or
theses, and (d) technical magazines (published by either the ACM or IEEE). If
an article from one of the above sources does not have a reference list
containing at least 3 references you may use it in your review paper but it
WILL NOT COUNT towards the “10 research or technical papers” requirement.
The requirement to “survey the professional literature” must
be met by using research papers/publications and technical papers which are
available from the following UMUC online library databases:
ACM Digital Library http://ezproxy.umuc.edu/login?url=http://www.acm.org/dl
Dissertations & Theses (Pro Quest) http://ezproxy.umuc.edu/login?url=http://search.proquest.com/pqdtft/advanced?accountid=14580
IEEE Computer Society Digital Library http://ezproxy.umuc.edu/login?url=http://www.computer.org/portal/web/csdl/home
Science Direct http://ezproxy.umuc.edu/login?url=http://www.sciencedirect.com/science/search
In this stage, you will evaluate and
report upon the information found during your survey of the professional
literature. Read the abstract, introduction section, and closing sections for
each of the sources identified in your survey of the professional literature.
From this information, develop a summary of the technology that includes: (a) a
description of technology and (b) planned uses of the technology (products,
services, etc.). IMPORTANT: your technology review must incorporate information
from each of your 10 “papers” from the professional literature.
Note: You may use other sources in
addition to the papers which comprise your survey
of the professional literature.
Next, brainstorm the security
implications of this technology (if these are not specifically discussed by
your sources). You should consider use of the technology to improve
cybersecurity and uses which will negatively impact the security posture of an
organization or the security of individual consumers or users of the product. It
is very important that you consider BOTH SIDES OF THIS ISSUE.
Note: Remember that the security
posture of a system or product is framed in terms of risk, threats,
vulnerabilities, etc. Improvements to the security posture (positive security
implications) will result in reduced risk, increased resistance to threats or
attacks, and decreased vulnerability.
Negative impacts on the security posture will result in increased risk,
decreased resistance to threats / attacks, and increased vulnerability
Write down your thoughts and ideas
about the security implications of this technology using (a) the Five Pillars
of Information Assurance and/or (b) the Five Pillars of Information Security. For
your paper, you do not need to include all ten “pillars” but you should address
a minimum of three. If you are targeting an “A” on your paper, address at least
five of the pillars.
Pillars of Information Assurance: confidentiality, integrity, availability,
authentication, and non-repudiation. These are defined
in CNSSI-4009 and discussed quite nicely by K. S. Wilson in Conflicts Among the Pillars of Information Assurancehttp://ezproxy.umuc.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edswsc&AN=000322695100011&site=eds-live&scope=site
Pillars of Information Security: protection, detection, reaction,
documentation, prevention. If you are not familiar with the
origins of the five pillars of Information Security, read a copy of the
original article by Amir Ameri at http://cf.rims.org/Magazine/PrintTemplate.cfm?AID=2409
You should provide specific examples
using characteristics and/or applications of the technology, e.g. an emerging
technology which can be used to manufacture cell phone cases which are less
breakable may be chosen to replace current materials because the new material
will decrease the risk of breakage. Decreased risk of breakage will decrease the probability of loss of
availability caused by a broken case. Decreasing the probability of a
negative event will decrease the risk
associated with that event.
Your paper must provide the reader with
an overview of the technology followed by information about the potential
security risks and/or benefits of its use (the security posture ).You MUST use information paraphrased from the
papers found during your Survey of the Professional Literature (with
appropriate in-text citations).
Your Technology Review papers should be
at least three pages in length but no more than five pages (excluding the title
page and references page).
You are expected to write grammatically correct English in
every assignment.patent invention: functional business validation innovation: new firm or program viable business
SBIR phase II
source frequently funds this technological stage
source occasionally funds this technological state
Purchase answer to see full
Why Choose Us
- 100% non-plagiarized Papers
- 24/7 /365 Service Available
- Affordable Prices
- Any Paper, Urgency, and Subject
- Will complete your papers in 6 hours
- On-time Delivery
- Money-back and Privacy guarantees
- Unlimited Amendments upon request
- Satisfaction guarantee
How it Works
- Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
- Fill in your paper’s requirements in the "PAPER DETAILS" section.
- Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
- Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
- From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.