Opis problema (dispozicija zaključnega dela): Razlika med redakcijama
m |
m |
||
(4 vmesne redakcije istega uporabnika niso prikazane) | |||
Vrstica 1: | Vrstica 1: | ||
Opis problema je poglavje [[Dispozicija zaključnega dela|dispozicije zaključnega dela]], ki postavi zaključno delo v kontekst, opredeli raziskovalni problem in predstavi, kako zaključno delo naslovi izpostavljen problem. | Opis problema je poglavje [[Dispozicija zaključnega dela|dispozicije zaključnega dela]], ki postavi zaključno delo v kontekst, opredeli raziskovalni problem in predstavi, kako zaključno delo naslovi izpostavljen problem. | ||
− | Tipično ima to poglavje natanko | + | Tipično ima to poglavje natanko tri odstavke: |
− | * [[#Splošno o tematiki]] | + | * [[#Splošno o tematiki|Splošno o tematiki]] |
− | * Fokus zaključnega dela in opredelitev problema | + | * [[#Fokus zaključnega dela in opredelitev problema|Fokus zaključnega dela in opredelitev problema]] |
− | * Doprinos zaključnega dela | + | * [[#Doprinos zaključnega dela|Doprinos zaključnega dela]] |
− | + | {|class="wikitable" | |
+ | !Namigi | ||
+ | |- | ||
+ | |To poglavje mora biti v celoti razumljivo tudi nepoznavalcem tematike ([[Test 7. razreda OŠ|test 7. razreda OŠ]]). | ||
+ | |- | ||
+ | |Za vsako poved označite, v kateri odstavek vsebinsko sodi (npr. ''highlight'' s tremi različnimi barvami). | ||
+ | |- | ||
+ | |V tem poglavju citirajte 10-30 člankov iz znanstvenih revij ali konferenc. | ||
+ | |- | ||
+ | |Reference iščite izključno v bibliografskih bazah [http://ezproxy.lib.ukm.si/login?url=http://www.webofknowledge.com Web of Science] in [http://ezproxy.lib.ukm.si/login?url=http://www.scopus.com Scopus] (dostop do [https://ukm.um.si/elektronski-viri elektronskih virov] uredite v knjižnici). | ||
+ | |} | ||
== Splošno o tematiki == | == Splošno o tematiki == | ||
− | + | Namen tega odstavka je predstaviti '''širši kontekst''' zaključnega dela. | |
+ | |||
+ | Praktično vsaka trditev v tem odstavku mora biti podkrepljena z relevantnimi citati (npr. 1-2 citata pred vsako piko). | ||
+ | |||
+ | {|class="wikitable" | ||
+ | !Primer <ref name="jelovcan2020" /> | ||
+ | |- | ||
+ | |Higher education is one of the most exposed and targeted sectors by cyberattacks [3]. Using communication software with end-to-end encryption (E2EE) which encrypts the transmitted data in a way that third parties including the communication provider cannot access it helps to partially address this issue. E2EE communication software, such as WhatsApp, Viber, Telegram and Signal, which are already widely accessible and adopted by the general public [2] can help secure the communication channels used by the academics. Since the human factor remains one of the weakest links in cybersecurity of organizations [4], it is important to understand what motivates academics to adopt and use E2EE communication software. | ||
+ | |} | ||
== Fokus zaključnega dela in opredelitev problema == | == Fokus zaključnega dela in opredelitev problema == | ||
− | + | Namen tega odstavka je preiti iz širšega konteksta na '''ožji fokus''' zaključnega dela. Zadnji del odstavka je namenjen '''opredelitvi raziskovalnega problema'''. Raziskovalni problem je nekaj, kar še ni bilo raziskano, ali pa je naše razumevanje tega pomanjkljivo. | |
+ | |||
+ | Praktično vsaka trditev v tem odstavku mora biti podkrepljena z relevantnimi citati (npr. 1-2 citata pred vsako piko). Izjema je zadnji del odstavka, ki opredeljuje raziskovalni problem. | ||
+ | |||
+ | {|class="wikitable" | ||
+ | !Primer <ref name="jelovcan2020" /> | ||
+ | |- | ||
+ | |The protection motivation theory (PMT) is one of the most widely accepted theories for explaining protection motivation in cybersecurity. It postulates that self-protective behavior is the result of threat (perceived severity and perceived vulnerability) and coping (self-efficacy and response efficacy) appraisal [5]. Since E2EE communication software aims to secure private communication from cyberthreats [1], PMT can be employed to explain its adoption. Nevertheless, it is not yet clear which threat appraisal factors exactly influence adoption and whether information sensitivity plays a role in the adoption of E2EE communication software among academics. | ||
+ | |} | ||
== Doprinos zaključnega dela == | == Doprinos zaključnega dela == | ||
+ | |||
+ | Namen tega odstavka je jasno predstaviti '''doprinos''' zaključnega dela in podati vpogled v to, kako to doseči z vsebinskega vidika (ne opisujte raziskovalne metodologije). | ||
+ | |||
+ | Doprinos zaključnega dela mora biti jasno povezan z izpostavljenim raziskovalnim problemom. | ||
+ | |||
+ | {|class="wikitable" | ||
+ | !Primer <ref name="jelovcan2020" /> | ||
+ | |- | ||
+ | |In this paper, we focus on an extended threat appraisal process to address this gap. To gain a better understanding of academics’ adoption of E2EE communication software, we study the associations between behavioral intention to use E2EE communication software and perceived vulnerability and perceived severity of communication interception, trust in provider of E2EE communication software, trust in government, fear of government intrusions, and privacy concerns separately for academics who perceive the sensitivity of information on their online communication as low and high. | ||
+ | |} | ||
+ | |||
+ | == Literatura == | ||
+ | |||
+ | <references> | ||
+ | <ref name="jelovcan2020">Luka Jelovčan, Damjan Fujs, Simon Vrhovec, and Anže Mihelič. “The role of information sensitivity in adoption of E2EE communication software”. In: European Interdisciplinary Cybersecurity Conference (EICC 2020). Rennes, France: ACM, 2020 (forthcoming), 13:1–2. doi: 10.1145/3424954.3424967</ref> | ||
+ | </references> |
Trenutna redakcija s časom 08:42, 7. december 2020
Opis problema je poglavje dispozicije zaključnega dela, ki postavi zaključno delo v kontekst, opredeli raziskovalni problem in predstavi, kako zaključno delo naslovi izpostavljen problem.
Tipično ima to poglavje natanko tri odstavke:
Namigi |
---|
To poglavje mora biti v celoti razumljivo tudi nepoznavalcem tematike (test 7. razreda OŠ). |
Za vsako poved označite, v kateri odstavek vsebinsko sodi (npr. highlight s tremi različnimi barvami). |
V tem poglavju citirajte 10-30 člankov iz znanstvenih revij ali konferenc. |
Reference iščite izključno v bibliografskih bazah Web of Science in Scopus (dostop do elektronskih virov uredite v knjižnici). |
Splošno o tematiki
Namen tega odstavka je predstaviti širši kontekst zaključnega dela.
Praktično vsaka trditev v tem odstavku mora biti podkrepljena z relevantnimi citati (npr. 1-2 citata pred vsako piko).
Primer [1] |
---|
Higher education is one of the most exposed and targeted sectors by cyberattacks [3]. Using communication software with end-to-end encryption (E2EE) which encrypts the transmitted data in a way that third parties including the communication provider cannot access it helps to partially address this issue. E2EE communication software, such as WhatsApp, Viber, Telegram and Signal, which are already widely accessible and adopted by the general public [2] can help secure the communication channels used by the academics. Since the human factor remains one of the weakest links in cybersecurity of organizations [4], it is important to understand what motivates academics to adopt and use E2EE communication software. |
Fokus zaključnega dela in opredelitev problema
Namen tega odstavka je preiti iz širšega konteksta na ožji fokus zaključnega dela. Zadnji del odstavka je namenjen opredelitvi raziskovalnega problema. Raziskovalni problem je nekaj, kar še ni bilo raziskano, ali pa je naše razumevanje tega pomanjkljivo.
Praktično vsaka trditev v tem odstavku mora biti podkrepljena z relevantnimi citati (npr. 1-2 citata pred vsako piko). Izjema je zadnji del odstavka, ki opredeljuje raziskovalni problem.
Primer [1] |
---|
The protection motivation theory (PMT) is one of the most widely accepted theories for explaining protection motivation in cybersecurity. It postulates that self-protective behavior is the result of threat (perceived severity and perceived vulnerability) and coping (self-efficacy and response efficacy) appraisal [5]. Since E2EE communication software aims to secure private communication from cyberthreats [1], PMT can be employed to explain its adoption. Nevertheless, it is not yet clear which threat appraisal factors exactly influence adoption and whether information sensitivity plays a role in the adoption of E2EE communication software among academics. |
Doprinos zaključnega dela
Namen tega odstavka je jasno predstaviti doprinos zaključnega dela in podati vpogled v to, kako to doseči z vsebinskega vidika (ne opisujte raziskovalne metodologije).
Doprinos zaključnega dela mora biti jasno povezan z izpostavljenim raziskovalnim problemom.
Primer [1] |
---|
In this paper, we focus on an extended threat appraisal process to address this gap. To gain a better understanding of academics’ adoption of E2EE communication software, we study the associations between behavioral intention to use E2EE communication software and perceived vulnerability and perceived severity of communication interception, trust in provider of E2EE communication software, trust in government, fear of government intrusions, and privacy concerns separately for academics who perceive the sensitivity of information on their online communication as low and high. |
Literatura
- ↑ 1,0 1,1 1,2 Luka Jelovčan, Damjan Fujs, Simon Vrhovec, and Anže Mihelič. “The role of information sensitivity in adoption of E2EE communication software”. In: European Interdisciplinary Cybersecurity Conference (EICC 2020). Rennes, France: ACM, 2020 (forthcoming), 13:1–2. doi: 10.1145/3424954.3424967