Assignment title: Information
SIT792: Assignment 3 & 4
ASSIGNMENT 3: ORAL PRESENTATIONS
Each student will give a 15-minute presentation with 5min for questions and discussions of
his/her project to the member of staff and students. The focus of the presentation should be a
demonstration of results and not just repetition of sections of the report.
The time and location will be arranged by the supervisors and the students.
BASIC CRITERIA ADDITIONAL CRITERIA EXCEPTIONAL CRITERIA
Understanding of the problem
Completion of the project
("Completion" covers
achievement of the original
objectives, achievement of
modified objectives, or providing
convincing evidence that the
objectives are unachievable.)
Quality of the work
Quality of the report
Knowledge of the literature
Critical evaluation of previous
work
Critical evaluation of own work
Justification of the design
decisions
Solution of any conceptual
problems
Amount of work
Evidence of originality
Outstanding scholarship
and/or publishable
research
ASSIGNMENT 4: REPORT
The report constitutes a significant piece of your work. The final report should be more than
15 pages (indicative only) excluding references, figures and tables. The report should be of
high standard and clearly identify the student's intellectual input into the work. Also, it should
include a review of the methods used in the project and the findings of the project against what
is already known in the field. The critical review should include suggestions for further study
which might advance the field and which could in turn entail, where appropriate, an
examination of the wider implications of the findings for community and individual health
concerns.
Report organization format (minimum requirements)
A report between 15 and 30 pages. The page count includes all text, but excludes the title
page, both figure and table and list of references. Marks will be deducted at the rate of 5%
per page if your report is shorter than the range specified.
You should not copy and paste any graphs, diagrams, charts, and tables from anywhere. 20
marks will be deducted for each graph, diagram, chart, and table copied and pasted even if
cited.
You must write this report in essay form. 5 marks will be deducted for each bullet points
used in the report.
The report is to be written as if it is to be submitted for publication to a reputable academic
journal. To help you meet the requirements of the proposed journal you will follow the
guidelines for authors provided by the Journal of Research and Practice in Information
Technology. This is an academic journal published by the Australian Computer Society.
The guidelines for preparation of your manuscript can be found at
http://ws.acs.org.au/jrpit/JRPITAuthors.html
Your report must be prepared using the latest version of Microsoft Word used at Deakin
University to enable us to readily access your submissions. If you have any concerns about
this requirement please contact your campus coordinator before committing your
assignment to any other software!
If you are new to technical writing or would like to brush up your skills, you can find an
excellent help here: http://www.deakin.edu.au/current-students/study-support/studyskills/handouts/index.php. You can also search online for help in technical writing. I am
also happy to help you with your efforts.
References, Citation and Quotation
In scholarly reports such as your project, the authenticity, reliability and validity of information
from which your work drives are very important. The inherent nature of the Internet's selfregulating and open structure makes it easy to publish, manipulate and distribute information
and, hence the problem of authenticity, reliability and validity of information arises. "A
research paper using only Internet sources is a weak paper, and puts you at a
disadvantage for not utilizing better information from more academic sources." You
should adhere to the following rules for references, citation and quotations:
Reputable references – You must provide (at least three) reputable references (extra to the
page limit). By reputable it means scholarly articles that have been verifiably peer reviewed
before being published. A very good source of reputable references is scholarly journals.
The library provides access to many online reputable sources (e.g., IEEE Xplore) and I
suggest you use them. If in doubt, let me know and I will be happy to clarify any article.
After all, these are peer-reviewed and published scientific papers, and they can serve as
useful models for your own writing.
The reference list should only contain all the works cited in the paper and must be directly
relevance to IT security management.
Current references – Must not be more than 3 years old. Any reference that is older than
3 years will not be counted.
Reference and citation style - Only the Harvard reference style (see
http://www.deakin.edu.au/current-students/study-support/studyskills/handouts/authordate-harvard.php) is accepted. Make sure that all references cited in
the text (and no others) ordered alphabetically by author name and then the year.
Quotation must not be more than 4 and each quotation must not be more than 10 words.
Also, more than one quotation from the same source is not acceptable.
Submission
Refer to the unit guide for details on the date, time and format of the submission.
Project submitted late without documented approval of the Unit Chair will be penalised.
Marking Scheme
This project contributes a total of 50% to your final assessment. Marks will be awarded for
content, research component including supporting references, your understanding and
application of the topic, the innovativeness of your contribution to the debate, structure of the
report, presentation of the report including spelling and grammar, and adherence to the
guidelines.
CONTENT 50 point
Organised around & related directly to the project title
Applied good knowledge
Convincing work
Well written
Adhere to requirements (e.g., word counts, quotation, essay form, JRPIT)
Illustrations
CRITICAL APPRIASAL 20 point
Apply analysis (i.e., assessment of the work of others while discussing strengths and
weaknesses).
Relevant, appropriate, and useful
Synthesize results into a summary of what is and is not known
Identify areas of controversy in the literature
INNOVATION 20 points
Make significant contributions
Make good contributions
Make marginal contributions
REFERENCES 10 points
It is in required style (i.e., Harvard method of referencing)
At least three reputable, electronic or paper-based references.
Relevance to IT security management
Consistent and accurate
CONCLUSION 5 points
Summarize the main points of evidence for the reader in one paragraph.
Formulate questions that need further research
DIAGRAMS, CHARTS, TABLES -20 points
5 marks will be deducted for each bullet points used in the report.
20 marks will be deducted for each graph, diagram, chart, and table copied and pasted even if
cited.
BULLET POINTS -20 points
5 marks will be deducted for each bullet points used in the report.
Plagiarism - "Plagiarism is the copying of another person's ideas or expressions without
appropriate acknowledgment and presenting these ideas or forms of expression as your own."1
Deakin University, as well as the Faculty of Science and Technology and the School of IT view
plagiarism as a serious offence and impose heavy penalties on students found guilty of the
offence. If any student is suspected of plagiarism, their work will not be marked until they have
provided evidence that their submission is their own work. You must use your own words and
must cite the sources of any concepts used. Any material copied and pasted from anywhere
(e.g., figures and text) is considered plagiarism even if references are given.
1 Faculty of Science and Technology Plagiarism notice. The full text will be found in DSO.