1639 GCS210462 NguyenQuangHuyASM1 Brief

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

Unit 16: Computing Research Project

Assignment Brief 1

Unit Number and Title Unit 16: Computing Research Project

Academic Year 2023 - 2024

Unit Tutor Ho Hai Van

Assignment Title Proposing and conducting a research project

Issue Date 01 September 2023

Submission Date 01 August 2023

Submission Format
Format The submission is in the form of an individual written report that shows
how you have manage the project. This should be written in a concise,
formal business style using single spacing and font size 12. You are required
to make use of headings, paragraphs and subsections as appropriate, and
all work must be supported with research and referenced using the Harvard
referencing system. Please also provide a bibliography using the Harvard
referencing system.
Submission Students are compulsory to submit the assignment in due date and in a way
requested by the Tutors. The form of submission will be a soft copy in PDF
posted on corresponding course of http://cms.greenwich.edu.vn/
Note The Assignment must be your own work, and not copied by or from another
student or from books etc. If you use ideas, quotes or data (such as
diagrams) from books, journals or other sources, you must reference your
sources, using the Harvard style. Make sure that you know how to reference
properly, and that understand the guidelines on plagiarism. If you do not,
you definitely get fail.

Unit Learning Outcomes

LO1: Examine appropriate research methodologies and approaches as part of the research
process.
LO2: Conduct and analyse research relevant for a computing research project
LO3: Communicate the outcomes of a research project to identified stakeholders

04.83-BM/ĐT/HDCV/FE 1/1 1/19


Transferable skills and competencies developed

The assignment offers students the chance to explore various aspects of big data from the
perspective of computing professionals or data scientists. It also encourages investigations
into the applications, benefits, limitations, and responsibilities associated with big data and
provides solutions to the problems it aims to solve.

Vocational scenario

Introduction to theme
Big Data
Over the past decade, the term "big data" has gained increasing popularity. Initially, it
referred to data generated in massive volumes, such as internet search queries, weather
sensor data, and social media information. Nowadays, big data represents large amounts
of information from diverse sources that cannot be processed conventionally or without
computational intervention. Big data can be stored in structured, unstructured, or semi-
structured formats. Many systems and organizations generate massive quantities of big
data on a daily basis, some of which are publicly available for analysis. Consequently,
machine learning systems have been developed to sift through this data, rapidly identify
patterns, and solve problems. This has led to the emergence of data science analytics as a
discipline to design, build, and test machine learning and artificial intelligence systems.
Leveraging big data requires a broad range of knowledge and skills, creating new
opportunities for previously inaccessible organizations. It allows businesses to gain a
comprehensive understanding of global trends, enabling more accurate and up-to-date
decision-making. Big data can help identify potential business risks earlier and minimize
costs without compromising innovation. However, the rapid application of big data raises
concerns about security, the ethical storage of personal data from multiple sources, and
the sustainability of energy requirements in large data warehouses.
Task
Students are to choose their own research topic for this unit. Strong research projects are
those with clear, well focused and defined objectives. A central skill in selecting a research
objective is the ability to select a suitable and focused research objective. One of the best
ways to do this is to put it in the form of a question. Students should be encouraged by
tutors to discuss a variety of topics related to the theme to generate ideas for a good
research objective.
The range of topics discussed could cover the following:
• Storage models.
• Cyber security risks.

04.83-BM/ĐT/HDCV/FE 1/1 2/19


• Future developments and driving innovation.
• Legal and ethical trade-offs.
The research objective should allow students to broaden their understanding and widen
their erspective of being able to explore, argue, prove, and/or disprove a particular
objective. The research objective should be feasible, novel, ethical, relevant and ultimately
of interest to the student

Assignment activity and guidance

You have to set your own research question in the research proposal base on the previous
range of topic. The research question must be specific enough example: the audience of
the research (job, age..), kind of devices(personal devices, household appliances, or
combination of some kinds).
Recommended Resources

Article: 6V’s of Big Data https://www.geeksforgeeks.org/5-vs-of-big-data/

Article: Business Ethics and Big Data https://www.ibe.org.uk/resource/business-ethics-and-big-


data.html

Article: What is Big Data Security? Challenges & Solutions https://www.datamation.com/big-


data/big-data-security/

Article: What is Big Data? https://www.oracle.com/uk/big-data/what-is-big-data/

Magazine: Information Sciences https://www.sciencedirect.com/journal/information-sciences

Magazine: Big Data Research https://www.sciencedirect.com/journal/big-data-research

Report: Big Data & Investment Management: The Potential to Quantify Traditionally Qualitative
Factors https://tinyurl.com/yff4uenz

Webinar: Big Data Sources & Analysis Webinar https://tinyurl.com/2p85d7mb

Video: Big Data In 5 Minutes|What Is Big Data?|Introduction To Big Data|Big Data Explained
https://www.youtube.com/watch?v=bAyrObl7TYE

Video: Challenges of Securing Big Data https://www.youtube.com/watch?v=3xIuIcPzMVs

Video: The Importance of Data Ethics https://www.youtube.com/watch?v=gLHMhCtxEYE

Book: A Bite-Sized Guide to Visualising Data https://tinyurl.com/38d6thsk

Book: Business Intelligence Strategy and Big Data Analytics

04.83-BM/ĐT/HDCV/FE 1/1 3/19


https://www.sciencedirect.com/book/9780128091982/business-intelligence-strategy-and-big-data-
analytics

Book: Principles and Practice of Big Data Preparing, Sharing, and Analysing Complex Information
https://www.sciencedirect.com/book/9780128156094/principles-and-practice-of-big-data

Book: Systems Simulation and Modelling for Cloud Computing and Big Data Applications
https://tinyurl.com/2s3wkehn

Journal: Big Data in Construction: Current Applications and Future Opportunities


https://www.mdpi.com/2504-2289/6/1/18

Journal: Big Data with Cloud Computing: Discussions and Challenges https://www.sciopen.com/arti
cle/pdf/10.26599/BDMA.2021.9020016.pdf

Journal: Mobile Big Data Solutions for a Better Future https://tinyurl.com/hpk2zvvw

Journal: The social implications, risks, challenges and opportunities of big data
https://tinyurl.com/yw593svk

Journal: Policy discussion – Challenges of big data and analytics driven demand-side management
https://tinyurl.com/kyb3j6x7

Journal: Explore Big Data Analytics Applications and Opportunities: A Review


https://tinyurl.com/597j8nd3

Journal: What is Big Data? https://www.oracle.com/cl/a/ocom/docs/what-is-big-data-ebook-


4421383.pdf

Journal: Towards felicitous decision making: An overview on challenges and trends of Big Data
https://www.sciencedirect.com/science/article/abs/pii/S002 0025516304868

Journal: Critical analysis of Big Data challenges and analytical methods


https://www.sciencedirect.com/science/article/pii/S014829631630488X

Journal: Big Data Security Issues and Challenges https://tinyurl.com/wabx7zya

Journal: IoT Big Data Security and Privacy Versus Innovation


https://ieeexplore.ieee.org/abstract/document/8643026

Journal: Big Data Security and Privacy Protection https://www.atlantis-press.com/proceedings/icmcs-


18/25904185

Journal: Big data analytics in Cloud computing: an overview


https://journalofcloudcomputing.springeropen.com/articles/10.1186/s13677-022-00301-w

04.83-BM/ĐT/HDCV/FE 1/1 4/19


Please note that the resources listed are examples for you to use as a starting point in your research –
the list is not definitive.

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Examine appropriate research methodologies and LO1 & LO2


approaches as part of the research process D1 Critically evaluate the project
management process and
P1 Produce a research M1 Evaluate different appropriate research
proposal that clearly research approaches and methodologies applied.
defines a research methodology and make
question or hypothesis justifications for the choice
supported by a literature of methods selected based
review. on
P2 Examine appropriate philosophical/theoretical
research methods and frameworks.
approaches to primary
and secondary research.

LO2 Conduct and analyse research relevant for a


computing research project

P3 Conduct primary and M2 Discuss merits,


secondary research using limitations and pitfalls of
appropriate methods for a approaches to data
computing research collection and analysis.
project that consider costs,
access and ethical issues.
P4 Apply appropriate
analytical tools, analyse
research findings and data

LO3 Communicate the outcomes of a research project LO3


to identified stakeholders D2 Communicate critical

04.83-BM/ĐT/HDCV/FE 1/1 5/19


P5 Communicate research M3 Coherently and logically analysis of the outcomes and
outcomes in an communicate outcomes to make valid, justified
appropriate manner for the intended audience recommendations.
the intended audience. demonstrating how
outcomes meet set
research objectives.

04.83-BM/ĐT/HDCV/FE 1/1 6/19


Table of Contents
Unit 16: Computing Research Project ........................................................................................................... 1

P1. Appropriate research question, aim, related documents in the research proposal .............................. 8

1. Introduction .......................................................................................................................................... 8

P2. Examine appropriate research menthods and approaches to primary and secondary research .......... 9

1. Literature review ................................................................................................................................... 9

2. Conclusion ........................................................................................................................................... 11

P3. Conduct primary and secondary research using appropriate methods for a computing research
project that consider costs, access and ethical issues ................................................................................ 11

2. Primary Research ................................................................................................................................ 11

P4. Apply appropriate analytical tools, analyze research findings and data .............................................. 12

1. What tools we used ............................................................................................................................ 12

P5. Communicate research outcomes in an appropriate manner for the intended audience. ................. 14

REFERENCES ................................................................................................................................................ 18

04.83-BM/ĐT/HDCV/FE 1/1 7/19


P1. Appropriate research question, aim, related documents in the research
proposal

1. Introduction
Introduce

Our project is to research and develop software that helps users detect and remove malicious code from
websites based on big data. This will be software used to detect malicious code from sites with large
data and prevent it from problems related to personal data to protect user information. In addition, the
project may encounter problems that arise during project implementation. Our task is to find reasonable
solutions to solve those problems and develop more systems.

Main research (aim)


Develop software based on big data to detect and remove malicious code from websites and improve
user protection against threats from online malware.
Secondary research (Objectives)
Collect and process big data from websites to create a rich data source for discovery
Develop machine learning algorithms and models that use big data to detect malicious code
manifestations on websites.
Build front-end software to provide notifications and procedures for removing malicious code from
websites.
Optimize the performance and scalability of the software to process data from millions of websites
simultaneously.
Ensure confidentiality and privacy during data collection and processing.

Example of ojectives:
Objective a: Collect data from thousands of popular websites, including those of large organizations,
online stores, and online forums.
Objective b: Develop a machine learning algorithm based on big data to detect the behavior of malicious
code, such as abnormal sequences in source code or malicious activity.
Objective c: Build a cross-platform user interface application, allowing users to view notifications about
malware threats and remove them easily.
Potential issues that arise throughout the project:
Big data processing complexity: Processing and storing big data from millions of websites requires
robust database systems and server infrastructure. This can put great pressure on infrastructure and
technical resources.

04.83-BM/ĐT/HDCV/FE 1/1 8/19


Data quality is not guaranteed: Data from websites may not always be reliable and subject to a lot of
noise. This requires data cleaning and dealing with misinformation.

Detection for new and advancing malware: Online malware is constantly evolving, and detecting new
manifestations of malware can be challenging. Software must be updated regularly to keep up with this
change.

Security and privacy: Collecting and processing data from websites can cause privacy and security issues.
There must be measures in place to protect data from attack and misuse.

P2. Examine appropriate research menthods and approaches to primary and


secondary research

1. Literature review
Research Methodologies
Research methodology is a way of explaining how a researcher intends to carry out their research. It's a
logical, systematic plan to resolve a research problem. A methodology details a researcher's approach to
the research to ensure reliable, valid results that address their aims and objectives. It encompasses what
data they're going to collect and where from, as well as how it's being collected and analyzed. A
research methodology gives research legitimacy and provides scientifically sound findings. It also
provides a detailed plan that helps to keep researchers on track, making the process smooth, effective
and manageable. A researcher's methodology allows the reader to understand the approach and
methods used to reach conclusions.

Having a sound research methodology in place provides the following benefits:

• Other researchers who want to replicate the research have enough information to do so.

• Researchers who receive criticism can refer to the methodology and explain their approach.

• It can help provide researchers with a specific plan to follow throughout their research.

• The methodology design process helps researchers select the correct methods for the objectives.

• It allows researchers to document what they intend to achieve with the research from the outset.

Type of Research methodology

Primary research: Primary research refers to research that has involved the collection of original data
specific to a particular research project (Gratton & Jones, 2010). When doing primary research, the
researcher gathers information first-hand rather than relying on available information in databases and
other publications.

04.83-BM/ĐT/HDCV/FE 1/1 9/19


This type of research is often carried out with the goal of producing new knowledge, which is why
primary research is also referred to as original research. By doing primary research, researchers aim to
answer questions that haven’t been answered or even asked before. This degree of originality sets
primary research apart from secondary research.
Additionally, original research is crucial for researchers aiming to be published in academic journals,
which currently number over 40,000. The degree of originality of the research is a major criterion for
publication (Callaham, 2002).
Secondary research: While primary research involves active participation from the researcher
themselves, secondary research involves the summary or synthesis of data and literature that has been
organized and published by others. When doing secondary research, researchers use and analyze data
from primary research sources.
Secondary research is widely used in many fields of study and industries, such as legal research and
market research. In the sciences, for instance, one of the most common methods of secondary research
is a systematic review. In a systematic review, scientists review existing literature and studies on a
certain topic through systematic methods, appraising all available studies to synthesize their findings
(Fitchburg State University, 2020). (Imed Bouchrika, 2021)
Qualitative: Qualitative research involves collecting and analyzing written or spoken words and textual
data. It may also focus on body language or visual elements and help to create a detailed description of
a researcher's observations. Researchers usually gather qualitative data through interviews,
observation and focus groups using a few carefully chosen participants.
This research methodology is subjective and more time-consuming than using quantitative data.
Researchers often use a qualitative methodology when the aims and objectives of the research are
exploratory. For example, when they perform research to understand human perceptions regarding an
event, person or product.
Quantitative: Researchers usually use a quantitative methodology when the objective of the research is
to confirm something. It focuses on collecting, testing and measuring numerical data, usually from a
large sample of participants. They then analyze the data using statistical analysis and comparisons.
Popular methods used to gather quantitative data are:

• Surveys

04.83-BM/ĐT/HDCV/FE 1/1 10/19


• Questionnaires
• Test
• Databases
• Organizational records
This research methodology is objective and is often quicker as researchers use software programs when
analyzing the data. An example of how researchers could use a quantitative methodology is to measure
the relationship between two variables or test a set of hypotheses.

2. Conclusion
There are many research methods, but I decided to choose primary research. Because Primary
research guarantees that the information collected is up-to-date and relevant, enabling accurate
trends to be revealed. And it cost low price.

P3. Conduct primary and secondary research using appropriate methods for a
computing research project that consider costs, access and ethical issues

2. Primary Research
To better understand Software research and development makes it possible for users to detect and
remove malicious code from websites based on big data. The main function used by primary research
are:

Survey: Include questions related to Software research and development to gather opinion from social
media.

Interview: Conduct with people to understand them better and gather detail

Focus group: Host a group of people with diverse opinion and ideas.

Survey Method

We using Google Forms (A free tool for creating online survey and questionaires) and interview and
Focus Group.

Type of object to conduct the survey:

Age: User ranger from 18 to 45 years old, Including middle and young age groups.

Sex: both men and women

04.83-BM/ĐT/HDCV/FE 1/1 11/19


P4. Apply appropriate analytical tools, analyze research findings and data

1. What tools we used


Tableau is one of the leading choices in modern self-service business analytics, offering the greatest
breadth, depth and flexibility on the Tableau platform, and here are the reasons why we chose Tableau :
• Deployment flexibility and choice: Includes on-premises, public cloud, or fully hosted SaaS deployments
with over 75 native data source connections.
• Unparalleled breadth and depth of analysis: For users of all skill levels - from drag-and-drop operations
and powerful, intuitive mapping to smart AI-driven recommendations and machine learning.
• Data integrity: Tableau provides users and administrators with a range of options to ensure data
security, such as access and authentication.
2. secondary analysis
Choose the dataset that matches our study: First, we will look for our study and save it to our device.
Our study is about “Research and development of software to help users detect and remove malicious
code from websites based on big data”.
Link the dataset: Then, after we obtain the dataset called Kaggle that we have gathered and that
dataset should be in a csv file. We will open the tableau on our device and choose the dataset before
linking the dataset

Figure :

Customize and format visualization: After we have connected the dataset, we are going to choose a
suitable row and a suitable column and fill it into bar.

04.83-BM/ĐT/HDCV/FE 1/1 12/19


Figure :

Create dashboard and import into Tableau Public website: After we completed all sheet about our
dataset, we would combined all the dataset and edited a dashboard including all our sheets. After that,
we would import into Tableau Public website to share our group and many other user access.

04.83-BM/ĐT/HDCV/FE 1/1 13/19


04.83-BM/ĐT/HDCV/FE 1/1 14/19
P5. Communicate research outcomes in an appropriate manner for the intended
audience.
Stakeholders Analysis

We must analyze the concerns of stakeholders, identify phenomena and organize the implementation of
recommendations. The report will be vague and unusable if the implementing agency and interests of
stakeholders are not identified. Stakeholders in this project:

⚫ Teammates: My team has supported me a lot in choosing the approach and topic development
method to apply to my project research as well as directing the construction of a reasonable
research process to develop the project. Leverage your strengths and overcome your weaknesses
to complete your research project as effectively as possible.
⚫ The people who conducted the interviews and surveys: They are very important people who
contributed greatly to my research project.
⚫ Myself: Much research has helped me create a Website project and see its importance at every
stage of my research and development project.

Survey Analysis

This chart displays survey respondents' agreement density for their roles of 'Student', 'Housewife', 'Self-
employed' and 'Employee' with different levels of agreement opinions vary from 'Disagree' to 'Agree'.
And this chart is completed including 2 elements:

04.83-BM/ĐT/HDCV/FE 1/1 15/19


Column: “Occupation”, “Do you think that preventing malicious code on websites cannot prevent
viruses?”

Row: Measured value (Number of users)

This chart shows the gender percentage of survey participants by age, and the majority were male

04.83-BM/ĐT/HDCV/FE 1/1 16/19


This chart shows the number of survey respondents who agree with downloading antivirus software
based on age range '18' to '33'. And this chart is completed including 2 elements:

Column: “Age”, “Do you want to download a software”

Row: Measured value (Number of users)

This chart displays survey respondents' agreement density based on gender with varying levels of
agreement from 'Strongly Disagree' to 'Agree'. And this chart is completed including 2 elements:

Column: “Gender”, “Do you think it is really important to prevent malicious code on websites?”

Row: Measured value (Number of users)

04.83-BM/ĐT/HDCV/FE 1/1 17/19


REFERENCES
1. CHAND, S. 2023. Decisions Making: Strategic, Tactical and Operational Decisions | Business
Management [Online]. Available: https://www.yourarticlelibrary.com/information-
technology/decisions-makingstrategic-tactical-and-operational-decisions-business-management/10271

[Accessed July 02 2023].

2. GAILLE, B. 2016. 14 Pros and Cons of Business Intelligence [Online]. Available:

https://brandongaille.com/14-pros-and-cons-of-business-intelligence/

[Accessed July 05 2023].

3. GLADUN, S. 2022. Auto Sales Apps: Why Car Dealers Need a Mobile App [Online]. Available:

https://agilie.com/blog/auto-sales-apps-why-car-dealers-need-a-mobile-app

[Accessed July 05 2023].

4. JANANI. 2021. Business Intelligence (BI) [Online]. Available:


https://www.atatus.com/glossary/businessintelligence/

[Accessed July 03 2023].

5. PICKELL, D. 2023. Structured vs. Unstructured Data: What's the Difference? [Online]. Available:

https://www.g2.com/articles/structured-vs-unstructured-data

[Accessed July 01 2023].

6. PROFIT.CO. 2023. Enabling Decision-Making Across Organizational Levels [Online]. Available:

https://www.profit.co/blog/behavioral-economics/enabling-decision-making-across-
organizationallevels/

[Accessed July 02 2023].

7. SAMSUKHA, A. 2020. Car Buy-Sell Mobile App Development Cost & Key Features [Online]. Available:

https://www.emizentech.com/blog/how-to-develop-car-buy-sell-mobile-app.html

[Accessed July 05 2023].

8. TIKAIT, P. 2022. Critically Important Business Intelligence Features [Online]. Available:

https://www.selecthub.com/business-intelligence/critical-business-intelligence-features/

04.83-BM/ĐT/HDCV/FE 1/1 18/19


[Accessed July 03 2023].

9. VISHWAKARMA, A. 2023. Difference between Structured, Semi-structured and Unstructured data


[Online]. Available: https://www.geeksforgeeks.org/difference-between-structured-semi-structured-
andunstructured-data/

[Accessed July 01 2023].

04.83-BM/ĐT/HDCV/FE 1/1 19/19

You might also like