Research Report Template
Report Title
Student Name
Student Number
E-mail Address
ABSTRACT
This formatting template is to be used for submissions of your Security Policy - Research Report. All students are required to follow these simple guidelines so that the look and feel of your assignments is identical to everyone’s in the course. In essence, you should format your paper exactly like this document. The easiest way to do this is simply to download this template, and replace the content with your own material. The template file contains specially formatted styles that will reduce your work in formatting your submission.
Every submission should begin with an abstract of about 150 words, followed by a set of keywords. The abstract should be a concise statement of the problem, approach and conclusions of the work described.
Keywords:
Add your own keywords here.
INTRODUCTION
Clarity of the introduction to the research topic. Introduces the reader to security policies.
LITERATURE REVIEW
This section of the assignment should include the literature review to find out the main purpose of the policy type that you are reviewing. Also, you need to have a discussion on how policies are used.
METHODOLOGY
In this section you need to discuss the steps or process that you used to develop the guidelines.
KEY RECOMMENDATIONS
In this section you need to write the set of guidelines that you developed based on the key findings from the literature review.
CONCLUSIONS
It is important that you write to the question being asked and that your assignment develops a set of guidelines based on the literature.
REFERENCES
References should refer to a list at the end of the article, ordered alphabetically by first author, and referenced in the text by names and year (i.e. Anderson 1992; Whitman & Mattord 2009). You need to include the location of conferences and the exact date. Example references are provided using the References style.
Anderson, R. 1992, ‘Social impacts of computing: Codes of professional ethics’, Social Science Computing Review, vol.10, iss.2, pp. 453-469.
Whitman, M. and Mattord, H. 2009, Principles of Information Security 3rd Edition, Course Technology, Canada.
Please pay attention to the following:
• Write in a straightforward style.
• Try to avoid long or complex sentence structures.
• Briefly define or explain all technical terms that may be unfamiliar to readers.
• Explain all acronyms the first time they are used in your text – e.g., “Smart Internet Technology Cooperative Research Centre (SIT-CRC)”.