Discussions

Part 1:

My Discussion

Please check with Ulrich’s Periodical Directory http://library.waldenu.edu/728.htm to ensure citations are peer reviewed.

Focus: Developing Your Introduction The introduction to a research study has a specific purpose and functionality that sets it apart from introductions you have probably read in books and popular literature. Although the introduction should engage the reader, it should also highlight particular information about the study and its orientation. For example, your introduction should have a purpose statement that explains particular elements of your study and sets the context for your study.

To prepare for this Discussion:

Review:

  • Chapters 5, 6, and 7 in the Creswell text to learn more about introductions, the purpose statement, research questions, and hypotheses; focus on the templates and examples in these chapters

  • Chapter 2, “Manuscript Structure and Content” in the APA Manual

  • TheA Typology of Research Purposes and its Relationship to Mixed Methods” book excerpt, which examines the research process, developing research questions, and using mixed methods

  • Sections on Introductions and Conclusions in the Introductions and Conclusions webpage

  • The Problem Statements interactive media

Post a 350-word abbreviated version of your Introduction required in this week’s Assignment. Be sure to include a problem statement, purpose statement, research questions, and hypotheses. Also include a rationale for your proposed study by referring to your literature review and how your problem statement emerged out of your analysis of the literature. Include at least two questions that will elicit comments and suggestions from your colleagues.

Be sure to support your postings and responses with specific references to the reading(s) and/or media segment(s) and use APA format.

==================================================

Part 2:

Respond to at two of your colleagues' postings

Respond to at two of your colleagues' postings. In your responses, be sure to consider the following:

  • Does the problem or issue identified justify this study?

  • How can the problem be framed in a way that is consistent with a research approach?

  • Do the past studies mentioned justify the problem's importance?

  • Do the specific deficiencies in past studies justify this study?

  • Does the purpose statement sufficiently provide a general working direction of the central phenomenon?

  • Do the research questions and hypotheses align with the problem statement and purpose statement?

Colleague #1

Background of the Problem

            The general IT promised that new threats are targeting virtual machines that reside on a hypervisor host. These threats are able to determine if a machine is a virtual machine and take actions accordingly (Donaldson, Coull, & McLuskie 2017). Once the threat is embedded on the host is capable of intercepting virtual machine and the host therefore compromising the security of the host and every virtual machine on it. Lacoste (2013) believes that one of the key areas for future research will be focusing security solutions that are closer to the hardware by installing the security solution on the virtual machine.

Problem Statement

            The general IT problem is that hypervisor security threats can potentially compromise all embedded machines on the host once the virtualization layer is breached (Arya, Gidwani, & Gupta, 2013). The specific IT problem is generally virtualization security is dependent on the guest operating system and does not address the security vulnerability of the main controller role of the hypervisor.

Purpose Statement

            The purpose of this qualitative case study Research is to identify the most successful security solution for protecting embedded virtual machines on a hypervisor hosts deployed by IT departments in the greater Cincinnati area. This study will provide successful hypervisor security practices that can benefit organizations of any size.

Research Questions

            What best practices do IT security administrators have in place to protect the virtualization layer?

            What is the best location for the security mechanism in proximity to the virtual machines?

Class Questions

Class,  

            My first question is, what alternative sources for research can be suggested? I am looking for something other than the typical databases.

            At a glance, what would be my biggest obstacle researching this problem?

Thank you in advance.

           

 

References

Arya, N., Gidwani, M., & Gupta, S. (2013). Hypervisor security - a major concernInternational Journal of Information and Computation Technology3(6), 533-538.

Donaldson, S., Coull, N., & McLuskie, D. (2017, June). A methodology for testing virtualisation security. Paper presented at International Conference on Cyber Situational Awareness, Data Analytics And Assessment (CyberSA 2017), London.

Lacoste, M. (2013). What does the future hold for hypervisor security? Retrieved from https://www.zurich.ibm.com/~cca/tclouds13/abstracts/what_does_future.pdf

Colleague #2


The Problem Statement
The explosive use and demand of wireless devices in recent years amidst technological advances for Internet of Everything (IoE) poses a great threat of depletion of the current Wireless Fidelity (Wi-Fi) radio-frequency spectrum, bandwidth, and data communication speeds as well as the ever increasing security threats from attackers. The wireless data communication demands have made the available radio spectrum below 10 GHz to become insufficient, a problem which has sparked interest in the wireless communication industry to find new techniques to go beyond the 10GHz boundary (Haas & Chen, 2015; Haas, 2016). Visible Light Communication (VLC) which can use light emitting diodes (LED) for Light Fidelity  (Li-Fi) technology promises several advantages and solutions including a 10,000 times wider bandwidth with a significantly improved security over Wi-Fi, is breaking grounds and generating more interests in the wireless industry(Sarkar, Agarwal, & Nath, 2015; Singh, 2015; Khan, 2016). Harald Haas, the inventor for Li-Fi talks of revolutionizing wireless data communication with his idea of data through illumination - simply where there is light there will be data. American Computing Machinery, IEEE, and several reputable service providers like AT&T predict that data in the amounts of zettabytes (1 billion terabytes) will be moved across wireless communication channels by 2020 prompting a dire need for new technologies that will provide faster and secure transmissions (Haas, 2016, Dhar, 2013).
Literature or Study Review
Appreciable research has been conducted in this field with some important observations in response to the growing needs. Several reports conclude that Li-Fi will bring tremendous advantages that include but not limited to better capacity with high transmission rates up to 10Gbps, improved efficiency due to less energy consumption by LED lights used, lower running cost, larger unlicensed bandwidth, a better security, easy availability, lesser interference, and the capability to use it in places where WiFi cannot (Gupta, 2015; Aggarwal & Jhanji, 2014). Researchers agree that Li-Fi is faster and a cheaper optical version of Wi-Fi based on bright LEDs. Survey work conducted on VLC and Li-Fi showed that more than 75% of wireless users from a reasonable sample desire better speeds and security but do not know how, and are just stuck with what is given them (Ergul et al., 2015; Dutta et al, 2015). Halper (2017), a contributor for the American Computing Machinery stated that this breakthrough is long overdue, and the opening up of the visual spectrum perhaps more than anything else is driving the development of the technology by a number of companies. It is important to note that there are challenges that Li-Fi faces in its young developmental stages including a line of sight transmission issue, inability to penetrate objects, limited use outdoors in the presence of strong natural lights, and the high initial setup cost (Hadi, 2016; Khan, 2017). The potential application of Li-Fi based on research shows that Li-Fi will go where Wi-Fi cannot such as surgical rooms in Healthcare, aviation, power plants, underwater explorations, and toys. The hazards posed by Wi-Fi restricts its use in medical devices and avionics.
Deficiencies in Literature or Studies
Despite its potential, Li-Fi has teething pains and it's not yet ready for mass adoption. Companies like Philips, pureLiFi, Oledcomm, Lucibel, and others are very engaged in seeing a rapid development for the market as soon as possible (Halker, 2017). Several retailers are embedding VLC in LED lights for in-store communications in test runs, including companies like Target, Aswaaq in Dubai, and Carrefour. Despite the increased interest in Li-Fi, it is a bit surprising that research in this area has not addressed extensively the practical use of the technology, the standardizations to be adopted, and the security implementations that will be associated with Li-Fi. Very few research has addressed these issues, although the advantages, disadvantages, and how it works have been explored extensively (Khandal & Jain, 2014; Singh, 2015; Aggarwal & Jhanji, 2014). 
Target Audience
Whether idealistic or not, the interest to further look at the practical implementation, uses, standardization, and security implementations of Li-Fi is worthy of further research that will benefit society as a whole. The obsessive demands for higher data speeds and security are common amongst Internet users, and such a study will be a step closer to the realization of Haas's dream of data by illumination. Information Technology practitioners will be the most joyous to have something worthy of use for the Internet of Everything. 
Purpose Statement
The purpose or intent of this research is to find or explore practical ways of implementing Li-Fi in companies, homes, schools, government as well as security implementations. The research will further review, explore and compile standards that can be practically used for VLC or Li-Fi adoption which is intended to help vendors to be consistent, compliant, and interoperable.
References
Aggarwal, A., & Jhanji, D. (2014). Comparative study: li-fi v/s wi-fi. International Journal of Research & Development in Technology and Management Science, 21(1).
Creswell, J. W. (2014). Research design: Qualitative, Quantitative, and Mixed Methods Approaches (4th ed.). Thousand Oaks, CA: SAGE.
Dhar, V. (2013). Data Science and Prediction. Communications of the ACM, 56 (12) 64-73. doi: 10.1145/2500499
Dutta, K., Chaudhuri, R. R., & Saha, A. (2015). Li-Fi Technology: Data through illumination. American Journal of Advanced Computing, Vol. II (2), 37-40.
Ergul, O., Dinc, E., & Akan, O. B. (2015). Communicate to illuminate: State-of-the-art and research challenges for visible light communications. Physical Communication, 17, 72-85.   DOI: 10.1016/j.phycom.2015.08.003
Gupta, S. U. (2015). Research on Li-Fi Technology& Comparison of Li-Fi/Wi-Fi. International Journal of Advanced Research in Computer Science and Software Engineering, 5(6).
Haas, H., & Chen, C. (2015). What is Li-Fi??. In Optical Communication (ECOC), 2015 European Conference on (pp. 1-3). IEEE.
Haas, H. (2016). LiFi: Conceptions, misconceptions, and opportunities. In Photonics Conference (IPC), 2016 IEEE (pp. 680-681). IEEE.
Hadi, M. A. (2016). Wireless Communication tends to Smart Technology Li-Fi and its comparison with Wi-Fi. American Journal of Engineering Research (AJER), 5(5), 40-47.
Halper, M. (2017). Li-Fi Promises Two-way Internet via Light Waves. Retrieved from https://cacm.acm.org/news/213948-li-fi-promises-two-way-internet-via-light-waves/fulltext#
Khan, L. U. (2017). Visible light communication: Applications, architecture, standardization and research challenges. Digital Communications and Networks, 3(2), 78-88. DOI: 10.1016/j.dcan.2016.07.004
Sarkar, A., Agarwal, S., & Nath, A. (2015). Li-Fi technology: Data transmission through visible light. International Journal, 3(6).
Singh, G. (2015). Li-Fi (Light Fidelity)-An Overview to future Wireless technology in Field of Data Communication. Journal of Network Communications and Emerging Technologies (JNCET)(www.jncet.org) Volume, 5.