All our Essay orders are Original, and are written from scratch. Try us today at 30% off

In This Session, Discuss Some Of The Activities You Are Involved With In Preparation For Your Research… Scheduling Meetings, Data Collection Interviews Etc…

Iteration 1: Gathering Requirements
Finding Job as a Cyber Security Specialist
Action Research
Course Code:
Table of Contents Plan 3 Act 4 Observe 4 Reflect 5
First Iteration: Gathering Requirements
Plan. The first phase of the iteration is the planning phase that is concerned with describing the activities that are to take place in the accomplishment of the iteration. The first iteration is requirement gathering – that is, gathering information pertaining to what is required for one to get a job in cyber security. The planning for this iteration included a number of activities undertaken by the researcher in order to come up with a good plan that will see to it that the iteration is a success. Among the activities undertaken are as discussed below:
1. Establishing the goals of the iteration. The first activity in the planning phase was to determine the various goals of the iteration. Undertaking this iteration needs to bear certain results, and these are defined in order to help the action researcher chart a path towards their achievement. Among the goals defined in this phase include determining the minimum qualifications in cyber security.
2. Determining a set of activities. The second activity undertaken in the planning phase is establishing those activities that will aid in the accomplishment of the first iteration. These activities must be goal-oriented in that their core business is to help the researcher obtain the information about the career in cyber security.
3. Determining and allocating resources. Goals do require the researcher to use various resources to accomplish them. The third activity entails determining those resources that will be required to attain the objectives of the first iteration of the action research. After determining them, the resources are then allocated to the various activities.
4. Monitoring. Lastly, there is a need to monitor the iteration and the activities being undertaken in order to ensure everything goes according to the plan.
Act. The second phase of this iteration is the action phase. This comes after planning whereby the main aim is to put the plan into action and accomplish the goals and objectives of the iteration. This is a phase that can take quite some time, and the time specified herein for this phase is a minimum of 40 hours. Since planning is done without specific knowledge of what will actually happen in the future, the action phase will also have to make necessary modifications to the plan, as well as take corrective measures so that the goals will ultimately be achieved. In determining the minimum requirements for one to get a job in cyber security, the following actions were undertaken.
1. Getting the resources ready. The first activity in the action phase is to get the resources ready so that the researcher can get set for real action. These resources were as established in the planning phase, and were made available.
2. Collecting data. The second activity was to collect data pertaining to the cyber security career. The researcher used various search engines to extract this data from the internet. Other sources were also utilized, and these include guides, handbooks, books, journals, news articles, etc.
3. Data analysis. After obtaining the raw data, data analysis followed, and this was simply in the form of content analysis to help extract the useful bits of the data.
4. The last action was to compile a list of the various requirements for one to get a job in cyber security. Various sources used did have a different set of requirement, and a comprehensive list that includes most of these is the end result of this phase.
Observe. The third phase of this iteration is the observation phase. The observation phase entails a discussion of the various activities undertaken throughout the iteration and their corresponding outcomes. Various issues as observed are explained herein.
Among the things observed in this iteration is that the cyber security career, just as is the case with other careers, requires basic education and certification. The minimum level of education is the college of which a certificate or diploma is required as evidence. Proper cyber security teaching programs do emphasize on the current technology, meaning that a person entering into this career also needs to be up to date with the emerging trends in technology. The teaching program should also equip the learner with the necessary tools and methodologies that keep knowledge evolving the same way technology does. Among the courses offered in teaching programs that forms part of the requirements for a job in cyber security include a bachelor’s in cyber security. Its coursework essentials include information security, computer hardware, vulnerability assessment, computer science and statistics among others. These are the essential skills in this career.
Various other certifications do improve the employability of a person, but may not be part of the minimum requirements for a job in this career. They boost competitiveness in the job market. Apart from the educational background, experience is vital in job acquisition in this field, and this is because of its technical nature. In that case, the person going for this job would need a particular level of experience which also forms part of the minimum requirements. The best way to gain this experience is through internships that are offered by various hiring organizations.
Reflect. The last phase of this iteration is the reflection phase. This is the phase that expresses the personal experiences in undertaking the entire iteration, and discusses not the lessons learned, but the researcher’s personal feelings and interpretations of the various incidences as observed within the iteration. It focuses on the success or failure and the causes of these, as well as the challenges and restraints encountered in the iteration.
The entire iteration was a success, and this is an indication that all went on as planned. The objectives and goals of the iteration were to establish the various aspects of a career in cyber security, including the minimum requirements and courses and skills that one need to possess. This was obtained as the researcher compiles the comprehensive list of these requirements. The major process that needs to be improved is data search. The criterion used for data search was a comprehensive one that aimed at taking into account all forms of data sources. However, all these sources end up giving similar basic requirements despite all the time taken. Time could be saved by streamlining this process.
Among the challenges experienced in this iteration was data analysis. As explained earlier on, this entailed content analysis, which meant going through all the sources made available, compare and contrast the information and compiling a list. This was a time consuming event, and this was coupled with the time restraints of 40 hours. However, everything went on well and the goals achieved. The major risk herein was generalizing the requirements, forgetting that there are companies that do require some form of differentiation or customization.
The post In This Session, Discuss Some Of The Activities You Are Involved With In Preparation For Your Research… Scheduling Meetings, Data Collection Interviews Etc… first appeared on Assignment writing service.



Great Job

Great job! Those were you, guys, who made my coursework perfect in time according to all my requirements. I will...

Best Service

The book review I asked for is so amazing! Endless thanks to your team for completing my review and for...

Comes through every time

I have used this website for many times, and each time they found perfect writers for me and they produce...

No Complaints So far Guys

Yeah …I really like all the discounts that they offer, the prices are very flexible. Plus they have different promotions...

Mh! not bad…

The worst part ever was to find my deadline postponed for 1 hour ! They couldn`t finish the essay within...


They look cool and trustworthy enough to me. I gather they made discounts as their prices are quite affordable if...

CLICK HERE  To order your paper

About Scholarfront Essay writing service

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for upto 20% off in their first Order. Our payment method is safe and secure.

 CLICK HERE to Order Your Assignment



Let your paper be done by an expert

Custom Essay Writing Service

Our custom essay writing service has already gained a positive reputation in this business field. Understandably so, all custom papers produced by our academic writers are individually crafted from scratch and written according to all your instructions and requirements. We offer Havard, APA, MLA, or Chicago style papers in more than 70 disciplines. With our writing service, you can get quality custom essays, as well as a dissertation, a research paper, or term papers for an affordable price. Any paper will be written on time for a cheap price.

Professional Essay writing service

When professional help in completing any kind of homework is all you need, is the right place to get it. We guarantee you help in all kinds of academia, including essay, coursework, research, or term paper help etc., it is no problem for us. With our cheap essay writing service, you can be sure to get credible academic aid for a reasonable price, as the name of our website suggests. For years, we have been providing online custom writing assistance to students from countries all over the world, including the United States, Canada, the United Kingdom, Australia, Italy, New Zealand, China, and Japan.