How to Write a Security Thesis on Different Subjects with the Aid of Basic Guidelines?
In the world of information technology; security has become a major issue that needs to get resolved as soon as possible. Data theft and identity theft are just a few out of many threats which are being faced by the information technology sector today. As information technology is a fast growing industry; thus, many students are planning to make a career in this field; therefore, they are pursuing degrees in IT.
Students pursing degrees in subjects related to IT security are required to write an IT security thesis based on the subject of their interests. For instance, they may write a network security thesis, computer security thesis, wireless security thesis or internet security thesis as a part of their partial degree completion requirement. However, most of the students struggle in coming up with an effective security thesis since they often ignore the basic guidelines of thesis writing.
Here is all that students should know about to come with an effective security thesis no matter what type of a thesis on security they are writing about:
In the title page, student must give the title for his/her security thesis with brief description of the title. Moreover, student should give the name of author, institution, department, research mentor, research mentor’s institution and submission date in the title page.
For a master’s thesis, the length of abstract should be around 150-250 thesis and in case of a doctorate thesis it should be around 250-350 words. In the abstract, you will be giving a concise summary of objective, method, results and conclusions of your thesis.
You will give the name of people who have assisted you throughout your thesis in acknowledgment page.
Table of Contents:
In table of contents, you will list down all the elements of your thesis.
Part I: Introduction:
Hypothesis or hypotheses of your security thesis should create a hook for the reader in introduction to get him/her engaged with your thesis from the beginning. In introductory part of the thesis, you will tell the reader about your thesis objectives on the basis of your research question and the scope of your research topic.
Part II: Background Research
In this part, you will be reviewing work of the past scholars and tell how you are going to make use of this background information for your research work. If there are any shortcomings in the background information; then, you will also be pointing those limitations in this part.
Part III: Methods
At times, one method may be significant but most of the times, you will find it difficult to find answer to the research question with just one research methodology. Whether you have to go for a qualitative research methodology or quantitative research methodology, it will depend on the nature of research question that you are going to investigate. Your data analysis will solely be based upon the research methods you are going to apply for the thesis.
Part IV: Results and Discussions
In results part, you will be providing statements of your observations including the statistics, tables and graphs. In discussions part, you will be interpreting the observed results.
Part V: Conclusions and Recommendations
In conclusions, you will summarize what can be learnt from your observed results. Was your hypothesis on security thesis significant or needs modification? That’s what you will be answering to the reader in this part. If your research work needs modification; then, you will provide the future recommendations.
You will cite down the resources which you have referred to in bibliography
You will provide the tables, graphs and research questionnaire if required for your thesis in appendices