Skip to main content
Top

2023 | Book

Research Techniques for Computer Science, Information Systems and Cybersecurity

Authors: Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor

Publisher: Springer Nature Switzerland

insite
SEARCH

About this book

This book introduces impact-driven research paths in computer science, information systems and cybersecurity with practical insights, effective instructions, and examples. The book takes the students through the full cycle of research until the point of submission and evaluation. The book begins by providing postgraduate research students with the foundational concepts and techniques to simplify the complexities associated with choosing topics in the computer science (CS), information systems (IS) and cybersecurity (CY) research domains. The authors furnish readers with fundamentals that facilitate active quantitative, qualitative, and mixed methods research enquiries. The content offers important perspectives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.ctives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.ctives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.ctives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.ctives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.ctives on how to think about deepening research in CS, IS and CY, noting that these subjects can be studied from computational sciences, engineering sciences, health sciences, social sciences, or interdisciplinary perspectives. This unique and contemporary book aims to benefit researchers, graduate students and engineers in the fields of computer science, information systems and cybersecurity in particular, in addition to other engineering and technology disciplines.

Table of Contents

Frontmatter
Chapter 1. Twenty-First Century Postgraduate Research
Abstract
This chapter presents postgraduate research as a purposeful, highly structured endeavour that enables the researcher to probe uncertainties and uncover gaps in knowledge and then to build the relevant insights, applications, models, frameworks or theories, to address those gaps. The chapter encourages the postgraduate research student to build a level of intellectual dedication and to acquire and practice a set of research design skills that will enable successful completion of a research project, whether for a Masters or PhD programme. The chapter focuses specifically on how research in this early part of the twenty-first century requires new design skills, new tools and techniques, particularly with respect to the current themes in computer science, information systems and cybersecurity. The chapter discusses the scientific paradigm, scientific philosophy, types of research, research cycle and quality in research writing.
Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor
Chapter 2. Computer Science (CS), Information Systems (IS) and Cybersecurity (CY) Research
Abstract
This chapter addresses itself to the distinctions between research in the fields of computer science, information systems and cybersecurity, as well as to their interplay with each other. The chapter explains that these three fields often require theoretical research, design-type research and the production of one or more artefacts. It presents visual conceptualizations and short explanations of each of the three fields of research. It discusses and maps the intersections across computer science, information systems and cybersecurity, using a visual mapping.
Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor
Chapter 3. Designing the Research Proposal or Interim Report
Abstract
This chapter explains what is required for postgraduate student researchers to design and submit the research proposal. In some universities, the student is required to present an interim report. It sets out the key components of the structure of the research proposal, including the research problem statement, research purpose statement, research questions or hypotheses, background to the research problem, literature review and methodology, list of references and in-text referencing. It gives specific attention to a guiding framework for thinking about originality in the research design.
Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor
Chapter 4. Adopting a Funnel Strategy and Using Mind Mapping to Visualize the Research Design
Abstract
This chapter explains the need to adopt a research strategy and illustrates the funnel strategy that enables the researcher to move from identifying the flaws, or defects or gaps that require attention to scoping the problem statement, finalizing the research proposal as a foundation for data collection and analysis and conducting the experiments or fieldwork, through to the point of analysis and thesis writing. It presents the funnel strategy as a roadmap that can be applied to completing the various phases of the research. The chapter demonstrates the application of mind mapping techniques (graphical representations of what to do and how to do it) to the identified research problem. It sets out a series of major activities as part of the mind mapping process. It presents a series of visuals, for example, artificial intelligence and robotics sub-topics.
Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor
Chapter 5. Foundational Research Writing, Background Discussion and Literature Review for CS, IS and CY
Abstract
This chapter is dedicated to explaining the skills a researcher needs, the types of background information required to support the research enquiry and the literature review that enables the researcher to situate the research in the context of existing research, while addressing the gap in knowledge. It explains how the research problem statement, the heart of the research, is the basis for building the background discussion and literature review. It illustrates the annotated bibliography technique, as a key step in the process of translating reading into academic writing. It explains different forms of background discussion and different forms of literature reviews. It shows how the literature review forms the basis for the analytical framework that will be applied to data analysis and presents an example analytical framework diagram.
Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor
Chapter 6. Research Philosophy, Design and Methodology
Abstract
This chapter emphasizes that the researcher must be grounded in a clearly stated research philosophy, early in the research process. The chapter discusses ontology, epistemology, axiology, doxology and methodology and the characteristics and distinctiveness of each. Using a series of tables, we show how positivist approaches, interpretivist approaches and pragmatist and realist approaches can be applied in the fields of computer science, information systems and cybersecurity. The chapter offers a diagrammatic view of key elements in research design, with an accompanying explanation. The types of research design covered in this chapter include descriptive, experimental, comparative, causal-comparative, correlational and requirements engineering design, as well as design elements for observational studies, simulation studies and case studies. Quantitative data collection techniques, qualitative data collection techniques and mixed-methods approaches are introduced as the basis for a more detailed discussion in Chapter 7.
Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor
Chapter 7. Data Collection, Presentation and Analysis
Abstract
This chapter covers the topics of data collection, data presentation and data analysis. It gives attention to data collection for studies based on experiments, on data derived from existing published or unpublished data sets, on observation, on simulation and digital twins, on surveys, on interviews and on focus group discussions. One of the interesting features of this chapter is the section dealing with using measurement scales in quantitative research, including nominal scales, ordinal scales, interval scales and ratio scales. It explains key facets of qualitative research including ethical clearance requirements. The chapter discusses the importance of data visualization as key to effective presentation of data, including tabular forms, graphical forms and visual charts such as those generated by Atlas.ti analytical software.
Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor
Chapter 8. Research Management: Starting, Completing and Submitting the Final Research Report, Dissertation or Thesis
Abstract
This chapter addresses the topics of research planning, the need to adopt your own personal strategy for completing the research and the adaptability to change in the research environment. It discusses the nature of the student researcher-supervisor relationship, noting the many roles of the supervisor, as guide, supportive mentor and facilitator, while it is ultimately the responsibility of the student researcher to produce the research. The challenges and practicalities of resource management, time management and research-life balance are discussed. The chapter concludes with a discussion of the process of preparing for defence and examination of the research report, dissertation or thesis.
Uche M. Mbanaso, Lucienne Abrahams, Kennedy Chinedu Okafor
Backmatter
Metadata
Title
Research Techniques for Computer Science, Information Systems and Cybersecurity
Authors
Uche M. Mbanaso
Lucienne Abrahams
Kennedy Chinedu Okafor
Copyright Year
2023
Electronic ISBN
978-3-031-30031-8
Print ISBN
978-3-031-30030-1
DOI
https://doi.org/10.1007/978-3-031-30031-8

Premium Partners