Two approaches to information security doctoral research

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Researchers embarking upon doctoral research in information security face numerous challenges at the commencement of their studies. Students often face confusion as they consider where to start and how to progress. The objectives of the research need to be clearly defined before commencing the project. The research questions, methodology, data and analysis are inextricably tied to the objectives, and as such a top-down approach is recommended. This paper discusses two approaches to doctoral research, topdown and bottom-up. The paper is designed to guide students at the commencement of their information security doctoral research. These guidelines may also be of value to the supervisor. © IFIP International Federation for Information Processing 2013.

Cite

CITATION STYLE

APA

Armstrong, H. (2013). Two approaches to information security doctoral research. In IFIP Advances in Information and Communication Technology (Vol. 406, pp. 172–179). Springer New York LLC. https://doi.org/10.1007/978-3-642-39377-8_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free