Technology Evaluation Study Plan – Detailed Assignment DescriptionChoose one of the student-written Technology Selection papers from the list posted by your instructor in the Week 7 conference. Read your chosen Technology Selection paper to learn more about the selected technology. Next, consider what type of formal evaluation study could be used to learn more about this technology and how it is likely to interact with people, processes, and technologies. Then, design a formal evaluation study which could be used to obtain more information about one or more of the following: characteristics (features and capabilities) of the technology interactions among technologies, people, environments, and processes (use cases or scenarios) risks or vulnerabilities associated with adoption of this technology costs and benefits associated with adoption of this technology Choose Your Evaluation MethodYour evaluation study design must use one of the following: Case Study Delphi Study (panel of subject matter experts) Quasi-Experiment (e.g. penetration testing or pilot testing in a controlled environment) Pilot Implementation (in a demonstration environment) See the Technology Evaluation Methods module in the Week 2 conference for detailed descriptions of each of these types of evaluation methods.Design Your StudyIdentify the specific questions that your formal evaluation study will address. These questions must be security-focused (review the Pillars of Information Security and Pillars of Information Assurance for ideas). Your design should include a description of the specific security issues which will be tested or security capabilities which will be evaluated. Use standard terminology when writing about security issues (see the rubric).Develop Your Evaluation Study PlanUse your study design to prepare a high-level plan for your evaluation study. Your plan must include the following: Introduction description of the emerging technology and justification for including it in an evaluation study Research Question(s) These must be security focused. Use the Five Pillars of Information Assurance and / or the Five Pillars of Information Security. Use “how” or “what” questions (writing good “why” questions is beyond the scope of this course). Examples What vulnerabilities exist that could be attacked to compromise confidentiality? How could an attacker compromise availability? For each research question, provide a brief description of a scenario or use case which could be used to answer the question. Your description should be one paragraph (no longer). Methods high level design of the study (focus upon the evaluation model and your research questions) description of how the technology will be incorporated or used in the study (including specific security issues which will be tested or security capabilities which will be evaluated) notional system or network architecture diagram showing the pilot test environment (only if you are doing a pilot study) Limitations or Special Considerations any special considerations or security concerns which must be addressed (e.g. “clean room,” test data sanitization, or isolation environment to prevent the pilot study from causing harm to operational systems) Timeline of Events (Notional) A notional timeline (expressed in days or months after start date) for your study Notional Timeline of EventsThe notional timeline of events (stated in days or months after start) that provides an estimate of how long you expect your evaluation study to take. For a Delphi Method study, your study could take as little as a day or two. For a Delphi Method Study, include the number of “rounds” and how long each round will be (the time allotted for experts to consider information and reply back with their opinion on the questions or issues). For a case study, quasi-experimental, or pilot implementation design, your study may span several months; in this case, divide your timeline into phases (setup, testing, reporting).Cost Estimate Is Not RequiredNormally, an evaluation study plan will include a cost estimate. For this course, we will NOT be including cost elements in our evaluation study plans as the information required to develop these items is not readily available to students. If you wish to address this area of a study plan, limit your discussion to a brief listing of the cost elements (people, technologies, facilities) and state that a cost estimate will be provided separately.Document Your PlanYour Technology Evaluation Study Plan should be at least three pages in length but no more than ten pages (excluding the title page and references page). This should be a high level design that can be read quickly. Your study plan must contain the five major sections defined above and comply with the formatting guidance provided by your instructor. Additional InformationConsult the grading rubric for specific content and formatting requirements for this assignment.Your 3-10 page study plan document should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. Your paper should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts Review for recommended resources.The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count.You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).
grading_rubric_technology_evaluation_study_plan_.pdf
Unformatted Attachment Preview
3/8/2019
Technology Evaluation Study Plan – CSIA 459 6381 Evaluating Emerging Technologies (2192) – UMUC Learning Management System
Criteria
Excellent
Outstanding
Acceptable
Nee
Identified an
appropriate
technology and
provided an
overview of the
technology
5 points
4 points
3 points
2 poin
Provided an introduc on
that contains an
excellent overview of an
emerging technology or
emerging applica on of
technology. The
overview appropriately
used informa on from
the survey of the
professional literature in
addi on to informa on
from other sources, i.e.
news ar cles, industry or
government white
papers and authorita ve
Web sites.
Provided an introduc on
that contained an
outstanding overview of
an emerging technology
or emerging applica on
of technology. The
overview appropriately
used informa on from
the survey of the
professional literature in
addi on to informa on
from other sources, i.e.
news ar cles, industry or
government white papers
and authorita ve Web
sites.
Provided an
introduc on that
contained an overview
of an emerging
technology or
emerging applica on of
technology. The
overview provided
some details about
how the technology is
used. The overview
drew some informa on
from the survey of the
professional literature
in addi on to
informa on from other
sources, i.e. news
ar cles, industry or
government white
papers or from
authorita ve Web
sites.
Iden
appro
Provid
or intr
lackin
Inform
survey
profes
was u
overv
Addressed
security issues
using standard
terms (e.g.5
Pillars IA, 5
Pillars
Information
Security)
5 points
4 points
3 points
2 poin
Demonstrated excellence
in the use of standard
cybersecurity
terminology to support
discussion of the
technology.
Appropriately used
terminology from five or
more pillars of IA/IS.
Discussion showed an
outstanding
understanding and
integra on of standard
cybersecurity
terminology to support
discussion of the
technology.
Appropriately used
terminology from five or
more pillars of IA/IS.
Correctly used
standard cybersecurity
terminology to support
discussion of the
technology.
Appropriately used
terminology from five
or more pillars of IA/IS.
Correc
cybers
termin
discus
techn
Appro
termin
or mo
Explained the
evaluation
methodology
15 points
13 points
11 points
9 poin
Provided an excellent
overview of the
evalua on methodology
that will be used to
evaluate the emerging
technology or emerging
applica on of
technology. The
overview appropriately
used informa on from
the authorita ve sources
Provided an outstanding
overview of the
evalua on methodology
that will be used to
evaluate the emerging
technology or emerging
applica on of technology.
The overview
appropriately used
informa on from the
authorita ve sources in
Provided an adequate
overview of the
evalua on
methodology that will
be used to evaluate the
emerging technology
or emerging
applica on of
technology. The
overview appropriately
used informa on from
Iden
metho
suitab
evalua
emerg
emerg
techn
appro
inform
autho
the pr
https://learn.umuc.edu/d2l/lms/dropbox/user/folder_submit_files.d2l?db=763059&grpid=0&isprv=0&bp=0&ou=348174
1/5
3/8/2019
Technology Evaluation Study Plan – CSIA 459 6381 Evaluating Emerging Technologies (2192) – UMUC Learning Management System
in the professional
literature in addi on to
informa on from other
sources, i.e. news
ar cles, industry or
government white
papers and authorita ve
Web sites
the professional
literature in addi on to
informa on from other
sources, i.e. news
ar cles, industry or
government white papers
and authorita ve Web
sites.
the authorita ve
sources in the
professional literature
in addi on to
informa on from other
sources, i.e. news
ar cles, industry or
government white
papers and
authorita ve Web
sites.
literat
inform
source
ar cle
gover
paper
autho
Listed and
explained the
research
questions to be
answered by
the study
10 points
8 points
7 points
6 poin
Iden fied three or more
research ques ons for
the study. Provided an
excellent discussion of
those research ques ons
using the characteris cs
of the emerging
technology or emerging
applica on of
technology. The
discussion appropriately
used informa on from
the survey of the
professional literature in
addi on to informa on
from other sources, i.e.
news ar cles, industry or
government white
papers and authorita ve
Web sites.
Iden fied two or more
research ques ons for
the study. Provided an
outstanding discussion of
those research ques ons
using the characteris cs
of the emerging
technology or emerging
applica on of technology.
The discussion
appropriately used
informa on from the
survey of the
professional literature in
addi on to informa on
from other sources, i.e.
news ar cles, industry or
government white papers
and authorita ve Web
sites.
Iden fied at least one
research ques on for
the study. Provided a
discussion of the
research ques on(s)
using the
characteris cs of the
emerging technology
or emerging
applica on of
technology. The
discussion
appropriately used
informa on from the
survey of the
professional literature
in addi on to
informa on from other
sources, i.e. news
ar cles, industry or
government white
papers and
authorita ve Web
sites.
Men
resear
focus
evalua
iden
resear
Discus
details
addre
charac
emerg
emerg
techn
discus
appro
inform
survey
profes
in add
inform
source
ar cle
gover
paper
autho
Explained
specific design
elements for
study
15 points
13 points
11 points
9 poin
Provided an excellent
discussion of the study
design (methodology).
The discussion
appropriately used
informa on from the
survey of the
professional literature in
addi on to informa on
from other sources, i.e.
news ar cles, industry or
government white
papers and authorita ve
Web sites.
Provided an outstanding
discussion of the study
design (methodology).
The discussion
appropriately used
informa on from the
survey of the
professional literature in
addi on to informa on
from other sources, i.e.
news ar cles, industry or
government white papers
and authorita ve Web
sites.
Provided an adequate
discussion of the study
design (methodology).
The discussion
appropriately used
informa on from the
survey of the
professional literature
in addi on to
informa on from other
sources, i.e. news
ar cles, industry or
government white
papers and
authorita ve Web
sites.
Discus
design
iden
of the
be use
appro
inform
survey
profes
in add
inform
source
ar cle
gover
paper
autho
https://learn.umuc.edu/d2l/lms/dropbox/user/folder_submit_files.d2l?db=763059&grpid=0&isprv=0&bp=0&ou=348174
2/5
3/8/2019
Technology Evaluation Study Plan – CSIA 459 6381 Evaluating Emerging Technologies (2192) – UMUC Learning Management System
Explained
security
considerations
for the study
15 points
13 points
11 points
9 poin
Provided an excellent
discussion of the security
considera ons that must
be incorporated into the
study design
(methodology). This
includes steps that must
be taken to ensure the
confiden ality of the
study and the integrity
and availability of the
resources required to
support the study.
Discussion also included
authen ca on and non‐
repudia on
requirements for the
execu on of the study.
The discussion
appropriately used
informa on from the
survey of the
professional literature in
addi on to informa on
from other sources, i.e.
news ar cles, industry or
government white
papers and authorita ve
Web sites.
Provided an outstanding
discussion of the security
considera ons that must
be incorporated into the
study design
(methodology). This
includes steps that must
be taken to ensure the
confiden ality of the
study and the integrity
and availability of the
resources required to
support the study.
Discussion also included
authen ca on and non‐
repudia on requirements
for the execu on of the
study. The discussion
appropriately used
informa on from the
survey of the
professional literature in
addi on to informa on
from other sources, i.e.
news ar cles, industry or
government white papers
and authorita ve Web
sites.
Provided an adequate
discussion of the
security considera ons
that must be
incorporated into the
study design
(methodology). The
discussion included
three or more of the 5
pillars of informa on
assurance. The
discussion
appropriately used
informa on from the
survey of the
professional literature
in addi on to
informa on from other
sources, i.e. news
ar cles, industry or
government white
papers and
authorita ve Web
sites.
Discus
securi
part o
but di
specifi
which
incorp
study
discus
appro
inform
survey
profes
in add
inform
source
ar cle
gover
paper
autho
Explained the
limitations or
special
considerations
affecting the
implementation
of the study
10 points
8 points
7 points
5 poin
Iden fied and provided
an excellent discussion of
3 or more limita ons or
special considera ons
(e.g. risk factors) which
could affect the
implementa on of the
study plan. Briefly
discussed how these risk
factors should be
managed. The discussion
appropriately used
informa on from the
survey of the
professional literature in
addi on to informa on
from other sources, i.e.
news ar cles, industry or
government white
papers and authorita ve
Web sites.
Iden fied and provided
an outstanding discussion
of 2 or more limita ons
or special considera ons
(e.g. risk factors) which
could affect the
implementa on of the
study plan. Briefly
discussed how these risk
factors should be
managed. The discussion
appropriately used
informa on from the
survey of the
professional literature in
addi on to informa on
from other sources, i.e.
news ar cles, industry or
government white papers
and authorita ve Web
sites.
Discussed limita ons
or special
considera ons (e.g. risk
factors) which could
affect the
implementa on of the
study plan. Briefly
discussed how risk
factors should be
managed. The
discussion
appropriately used
informa on from the
survey of the
professional literature
in addi on to
informa on from other
sources, i.e. news
ar cles, industry or
government white
papers and
authorita ve Web
sites.
Discus
circum
could
execu
plan a
manag
factor
appro
inform
survey
profes
in add
inform
source
ar cle
gover
paper
autho
https://learn.umuc.edu/d2l/lms/dropbox/user/folder_submit_files.d2l?db=763059&grpid=0&isprv=0&bp=0&ou=348174
3/5
3/8/2019
Technology Evaluation Study Plan – CSIA 459 6381 Evaluating Emerging Technologies (2192) – UMUC Learning Management System
Provided a
notional
timeline for the
study. Citations
not required
for this
element.
5 points
4 points
3 points
2 poin
Provided a detailed and
a rac vely designed
graphic showing
a no onal meline
expressed in days a er
start date. No onal
meline includes steps,
phases, and/or
milestones for the study.
Timeline has annota ons
to briefly explain each
major element and
shows “days a er start”
for each.
Provided a detailed and
a rac vely designed
graphic showing
a no onal meline
expressed in days a er
start date. No onal
meline includes clearly
iden fied steps, phases,
and/or milestones for the
study and shows “days
a er start” for each.
Provided
a no onal meline
expressed in days a er
start date. No onal
meline includes
clearly iden fied steps,
phases, and/or
milestones for the
study and shows “days
a er start” for each.
Provid
a no o
expres
start d
meli
steps,
milest
study
a er s
Professionalism
Part 1:
Consistent Use
and Formatting
for Citations
and Reference
List
5 points
4 points
3 points
2 poin
Work contains a
reference list containing
entries for all cited
resources. Sufficient
informa on is provided
to allow a reader to find
and retrieve the cited
sources. Reference list
entries and in‐text
cita ons are consistently
and correctly forma ed
using an appropriate
cita on style (APA, MLA,
etc.).
Work contains a
reference list containing
entries for all cited
resources. Sufficient
informa on is provided
to allow a reader to find
and retrieve the cited
sources. One or two
inconsistencies or errors
in format for in‐text
cita ons and/or
reference list entries.
Work contains a
reference list
containing entries for
all cited resources.
Sufficient informa on
is provided to allow a
reader to find and
retrieve the cited
sources. No more than
5 inconsistencies or
errors in format for in‐
text cita ons and/or
reference list entries.
Work
three
omiss
credi
facts a
Work
refere
entrie
resou
contai
10 inc
errors
Professionalism
Part II:
Organization &
Appearance
5 points
4 points
3 points
2 poin
Submitted work
Submitted work has
shows outstanding
minor style or
organization and the
formatting flaws but
use of color, fonts,
still presents a
titles, headings and
professional
sub-headings, etc. is
appearance.
Subm
mul p
forma
Organ
profes
appea
substa
impro
appropriate to the
Submitted work is
assignment type.
well organized and
Organiza on and/or
appearance of
submi ed work could
be improved through
be er use of fonts,
color, tles, headings,
etc. OR Submi ed work
has mul ple style or
forma ng errors.
Professional
appearance could be
improved.
7 points
6 poin
appropriately uses
color, fonts, and
section headings (per
the assignment’s
directions).
Professionalism
10 points
8 points
https://learn.umuc.edu/d2l/lms/dropbox/user/folder_submit_files.d2l?db=763059&grpid=0&isprv=0&bp=0&ou=348174
4/5
3/8/2019
Technology Evaluation Study Plan – CSIA 459 6381 Evaluating Emerging Technologies (2192) – UMUC Learning Management System
Part III:
Execution
No formatting,
grammar, spelling,
or punctuation
errors.
Work contains minor
errors in forma ng,
grammar, spelling or
punctua on which do not
significantly impact
professional appearance.
Errors in forma ng,
spelling, grammar, or
punctua on which
detract from
professional
appearance of the
submi ed work.
Subm
nume
forma
gramm
punct
unpro
appea
Total
/ 100
Overall Score
Excellent
90 points minimum
Outstanding
80 points minimum
Acceptable
70 points minimum
https://learn.umuc.edu/d2l/lms/dropbox/user/folder_submit_files.d2l?db=763059&grpid=0&isprv=0&bp=0&ou=348174
Needs Improvement
60 points minimum
5/5
…
Purchase answer to see full
attachment