Case Study Analysis

See attached articleCase Study AnalysisYour assignment is to use the article that was assigned to you, as well as your text book, and complete each of the sections below. The report must follow APA formatting and be at least 2 pages, double spaced, not including your Title and Reference page.Click here for the article.Introduction Provide an overview of the situation Identify key issues underlying the problems identified in the article that you readMain body Present and analyze the issues found in the article. Consider and assess possible solutions to the issues presented in the article(s) you’ve researched or were assigned. Include in your analysis material covered in the text book and material discussed in class. Draw from both your articles and your personal experience Select and discuss a solution that you think is bestConclusion Summarize main findings. Identify and justify strategy proposedReferences A list of sources consulted or referred to in alphabetical order

Using the empirical research article that your instructor approved in the Week 5 assignment, ask yourself: “Is this a quantitative research article or a qualitative research article?”

Using the empirical research article that your instructor approved in the Week 5 assignment, ask yourself: “Is this a quantitative research article or a qualitative research article?” Remember, in quantitative research, the emphasis is on measuring social phenomenon because it is assumed that everything can be observed, measured, and quantified. On the other hand, in qualitative research, it is assumed that social phenomenon cannot be easily reduced and broken down into concepts that can be measured and quantified. Instead, there may be different meanings to phenomenon and experiences. Often in qualitative research, researchers use interviews, focus groups and observations to gather data and then report their findings using words and quotations.Consider how these different methods affect the sampling design and recruitment strategy, and ask yourself how the recruitment of research participants will affect the findings.For this Assignment, submit a 3-4 page paper. Complete the following: Read your selected empirical research article, and identify whether the study is a quantitative or qualitative study. Justify the reasons why you believe it is a quantitative or qualitative study. (Your instructor will indicate to you if you are correct in identifying the research design. This will point you to whether you will use the “Quantitative Article and Review Critique” or the “Qualitative Article and Review Critique” guidelines for the final assignment in week 10.) Using the empirical research article, focus on the sampling method in the study and begin to evaluate the sampling method by answering the following: Describe the sampling methods in your own words (paraphrase, do not quote from the article). Describe the generalizability or the transferability of the research finding based on the sampling method. Discuss the limitations the article identified with the sample and how those limitations affect the reliability or credibility. Explain one recommendation you would make to improve the sampling plan of the study that would address these limitations in future research.

Any topic (writer’s choice)

Your final in this course is an original research paper investigating a social problem of your choosing. You may find here a document containing a list of possible paper topics, though you can write on any topic approved by your instructor. In this paper, you must address the following aspects of your problem:

-What are the causes and sociological explanations of the problem? Keep in mind the various theoretical perspectives.
-What factors (structural, cultural, interactional, political, etc.) contribute to the existence of the problem?
-What actions, on the part of society or within the power structure of society, may be able to address this problem?
-Do you think the problem can be fully solved? Why or why not?

Your paper must meet the following requirements:
-must be 4-5 pages, double spaced, size 12 Times New Roman font
-must be submitted in .doc or .docx format
-must cite at least three scholarly sources*
-must include a reference page in APA format.

*”Scholarly sources” include articles published in peer-reviewed journals and books published by university presses and other reputable presses for scholarly material. Many sources are available using the Library available via your EGCC Gateway, which provides guides for searching and allows you to restrict your search results to peer-reviewed publications. If you have questions regarding whether your sources are acceptable, please contact your instructor. Note that news articles, Internet pages, and Wikipedia will not be accepted as scholarly sources, no matter how good they sound.

To assist you in writing your paper in APA format, please visit the Purdue Online Writing Lab by clicking on the link.

https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html

Security Policy Conformance

Please Read the Instructions Carefully in the body of this post and in the Project 3.docx and project4.docx files attached below.
Discussion-1 450 words (topic : Fileless malware ):

APA Format, need References

Fileless malware is a type of malicious software that uses legitimate programs to infect a computer. Fileless malware exists only in memory, not in files, which makes it challenging for traditional antivirus products to detect. As a result, fileless attacks are much more likely to succeed than file-based attacks.

Answer the following question(s):

What do you suggest as a countermeasure to prevent fileless malware infections? Your solution can be technical or non-technical.

Discussion-2 450 words (topic : Security Policy Conformance):

APA Format, need References

An organization’s security policy can be interpreted in a few ways. A strict security policy interpretation means that no security controls exist unless they are directed by the policy. A less strict interpretation allows IT security to exercise some discretion to implement best practices that may not be explicitly defined in the security policy.

Answer the following question(s):

In your opinion, does strict security policy interpretation provide better security than a less strict interpretation? Why or why not?

Two Assignments ( each one minimum 3 pages content):

APA Format, need References, Font: Arial, size 12, double-space

Questions are attached below (file names: Project 3.docx, Project 4.docx)