Sie sind auf Seite 1von 1

Allison Li

IR-3 / 11 AP
04/07/2019
#23
Data & Project Timeline #5
● Project Summary:
1. First releasing surveys:
a. The first survey is for the entire school
i. It will be used to gauge the average amount of information that the
average student understands about cybersecurity and how to defend
against it either by increasing awareness or implementing certain
defenses into technology
ii. Asking if students who own SMB’s are willing to participate in an
interview
2. After surveys:
a. Conduct interviews with small business owners who’ve accepted
b. Create classroom presentations that will apply to students with the responses to
the schoolwide survey and inform the students of what they need to know
3. Final:
a. Write an article for the school newspaper on how to increase awareness as well
as what systems can be implemented and what they will do for defense
● Type of Data Collection:
○ Combination of surveys, interviews, and analyzing studies that were conducted before
● Goals:
○ Find and interview at least one small business owner (finished)
○ Finish creating my survey and show Ms. Sasser (finished general survey)
○ Continue looking at previous studies for possible surveys and graphs (completed)
○ Contact my advisor to see what suggestions they have for me (completed)
○ Complete my visual board (completed)
○ Finish with all the visual board information (completed)
○ Discuss with Mr. Tromble and other teachers about releasing my survey
○ Talk to Ms. Sasser about releasing my survey, make sure everything is ok
● Accomplishments
Jang-Jaccard, Julian, and Surya Nepal. “A Survey of Emerging Threats in Cybersecurity.”
Journal of Computer and System Sciences​, vol. 80, no. 5, Aug. 2014, pp. 973–93,
doi:​10.1016/j.jcss.2014.02.005​.
Updated Survey for General students:
1. What is your definition of cybersecurity?
2. What are some ways that you defend your technology from a cyber attack?
3. What are some ways you know that hackers can infiltrate?
4. Are you concerned about the cybersecurity of your digital info?
5. Do you believe that SMB’s (small business companies) are doing enough to protect the
confidential information of their customers?
6. Do you believe that small business companies are infiltrated more or less often than large
companies and why?
7. A small business can range anywhere from a babysitting service to a full-on business, if you are
an owner of a small business and are willing to be interviewed for an anonymous data collection
that is being conducted, please leave an email below.

Das könnte Ihnen auch gefallen