Sunday, January 31, 2010

#7 List of Research Questions/Problems (freewrite, 5-5-5 minutes)

Biometrics

Identify the parts and how they interrelate

What are the parts of your topic, and how do they relate to each other?

How do they scan for facial recognition?
What kind of computer architeture and systems are needed for biometrics security?
Can different types of biometric devices be used concurrently?

How is your topic part of a larger system?

Is biometrics better than normal types of security?
How is biometric security better than password security?

Trace is own history and its role in a larger history

How and why has your topic changed through time, as something with its own history?

Why is biometrics just becoming big now?
How will biometrics change in the future as technology grows more complex

How and why is your topic an episode in a larger history?

How will biometrics shape the future of security around the world?
Could biometrics fail at being secure in the future, making us revert back to other security measures?

Identify its characteristics and the categories that include it

What kind of thing is your topic?  What is its range of variation?  How are instances of it similar to and different from another?

How will biometric security better secure the systems that need securing?
Why are the security measures of today outdated and needing to be replaced by biometric devices?

To what larger categories can your topic be assigned?  How does that help us understand it?

How will computer security benefit from the advancement of biometrics?
We all know about fingerprints, but what other methods of biometric security measures are there?

Determine its value

What values does your topic reflect?  What values does it support?  Contradict?

Are the uses of biometric data again privacy laws or the privacy of individuals?
Should the authorities have access to your biological data such as hand and face patters?

How good or bad is your topic?  Is it useful?

Could biometrics be used for bad purposes?
What are the consequences and methods for fighting compromised biometric data?


Audio Compression


Identify the parts and how they interrelate

What are the parts of your topic, and how do they relate to each other?

How does audio compresssion relate to the actually devices that make the sounds?
Why is there a need for audio compression even when storage is so affordable?
What are the different methods of audio compression and how do they differ?
Among hte different methods of audio compression, which sound better to the human ear?

How is your topic part of a larger system?

How can the different audio compressions be used to trick your mind?


Trace is own history and its role in a larger history

How and why has your topic changed through time, as something with its own history?

How has audio compression changed with the invention of CD's, MP3's and DVD's?
Have differnt audio compression methods been designed to fit the new technology advances in sound storage?
How has audio compression advanced with the invention of newer and better audio technologies?

Determine its value

How good or bad is your topic?  Is it useful?

Does audio compression take the sound quality away form the listener?
What are the best methods of audio compression?


Network Security


Identify the parts and how they interrelate

What are the parts of your topic, and how do they relate to each other?

How are wireless and wired security similar?
Which is less secure, wireless or wired networks?

How is your topic part of a larger system?

How is cryptography used in the process of network security?
How is the method of data transfer across wireless networks vulnerable to attacks?


Trace is own history and its role in a larger history

How and why has your topic changed through time, as something with its own history?

With the invention of newer wireless technologies, has the advancement of security in the wireless field been less needed?

How and why is your topic an episode in a larger history?

What new technologies are on the horizon of breaking through, and will they be able to secure networks better?

Identify its characteristics and the categories that include it


What kind of thing is your topic?  What is its range of variation?  How are instances of it similar to and different from another?

How are the instances of a wired network and wireless network similar?
Of the wired and wireless networks, which are the more secure and why?
What are some different, unseen methods of securing networks?

Determine its value

What values does your topic reflect?  What values does it support?  Contradict?

Speaking of Google, Should their views on network security allow them to collect random information from their users?
What are the criminal charges placed against someone who infiltrates a computer network?

How good or bad is your topic?  Is it useful?

How could an attacker take advantage of a vulnerable wired or wireless network?




Reblog this post [with Zemanta]

No comments:

Post a Comment