Technology Evaluation Study Plan â Detailed Assignment Description
This assignment is the third and final part Analysis of Alternatives exercise.
Choose one of the studentwritten
Technology Selection papers from the list posted by your instructor in the Week 7
Read your chosen Technology Selection paper to learn more about the selected technology. Next, consider what type of
formal evaluation study could be used to learn more about this technology and how it is likely to interact with people,
processes, and technologies. Then, design a formal evaluation study which could be used to obtain more information
about one or more of the following:
o characteristics (features and capabilities) of the technology
o interactions among technologies, people, environments, and processes (use cases or scenarios)
o risks or vulnerabilities associated with adoption of this technology
o costs and benefits associated with adoption of this technology
CHOOSE YOUR EVALUATION METHOD
Your evaluation study design must use one of the following:
o Case Study
o Delphi Study (panel of subject matter experts)
(e.g. penetration testing or pilot testing in a controlled environment)
o Pilot Implementation (in a demonstration environment)
See the Technology Evaluation Methods module in the Week 2 conference for detailed descriptions of each of these types
of evaluation methods.
DESIGN YOUR STUDY
Identify the specific questions that your formal evaluation study will address. These questions must be securityfocused
(review the Pillars of Information Security and Pillars of Information Assurance for ideas). Your design should include a
description of the specific security issues which will be tested or security capabilities which will be evaluated. Use standard
terminology when writing about security issues (see the rubric).
DEVELOP YOUR EVALUATION STUDY PLAN
Use your study design to prepare a highlevel
plan for your evaluation study. Your plan must include the following:
ô description of the emerging technology and justification for including it in an evaluation study
o Research Question(s)
ô These must be security focused. Use the Five Pillars of Information Assurance and / or the Five Pillars of Information
ô Use âhowâ or âwhatâ questions (writing good âwhyâ questions is beyond the scope of this course).
ô What vulnerabilities exist that could be attacked to compromise confidentiality?
ô How could an attacker compromise availability?
ô For each research question, provide a brief description of a scenario or use case which could be used to answer the
question. Your description should be one paragraph (no longer).
ô high level design of the study (focus upon the evaluation model and your research questions)
ô description of how the technology will be incorporated or used in the study (including specific security issues which will
be tested or security capabilities which will be evaluated)
ô notional system or network architecture diagram showing the pilot test environment (only if you are doing a pilot study)
o Limitations or Special Considerations
ô any special considerations or security concerns which must be addressed (e.g. âclean room,â test data sanitization, or
isolation environment to prevent the pilot study from causing harm to operational systems)
o Timeline of Events (Notional)
ô A notional timeline (expressed in days or months after start date) for your study
NOTIONAL TIMELINE OF EVENTS
The notional timeline of events (stated in days or months after start) that provides an estimate of how long you expect your
evaluation study to take. For a Delphi
Limitless Amendmentsfor $23.99 Free
Bibliographyfor $12.99 Free
Outlinefor $4.99 Free
Title pagefor $4.99 Free
Formattingfor $7.99 Free
Plagiarism Reportfor $15.99 Free
Get all these free features for $70.94 FREEProceed to Order