EIOT-Assignment Questions
EIOT-Assignment Questions
Page 1 of 5
Title: A report on the recent developments in Enterprise IoT Technologies, Business Models &
Security
Weight: 50%
INTRODUCTION
Preparing a literature review report is a very useful way to become up to date on the
state of knowledge and the research that has been done in a particular area. Writing a
review report is good practice for synthesizing and organizing a lot of information into a
concise product (i.e. a short written document).
In this assignment you are required to prepare a report based on the reviews and
synthesizes on the recent literatures of Enterprise IoT topics.
The topics should be included in your report is as follows:
1. Enterprise IoT Enabling Technologies.
2. Enterprise IoT Application Infrastructure.
3. Enterprise IoT Management and Governance.
4. Enterprise IoT Business Models.
5. Enterprise IoT Security which includes privacy, ethics & technology
acceptance.
Page 2 of 5
Students often misinterpret the term literature review report to mean a collection of
source summaries, similar to annotations or article abstracts. While summarizing is an
element of a literature review, you will want to approach this assignment as a
comprehensive representation of your understanding of a topic or field, such as what has
already been done or what has been found.
You must do library research to collect journal and conference articles (and books) to
write your report. Information from the Internet will not be accepted, unless it is from a
journal, conference, or book that is published or available on the web. You should write
your report for an audience that is relatively familiar with your topic (such as a peer in this
class; i.e., you do not have to define very elementary concepts). However, you should not
assume that the reader has read the papers that you have read. In addition, you should
define any new terms or jargon that is necessary to understand content of the report.
REPORT STRUCTURE
Page 3 of 5
INSTRUCTIONS
You must refer at least 8 articles for the “Security” topic and at least 12 articles
for the other topics, not older than 2017.
Format: The report should be prepared using font type: Times New Roman, font
size: 12 (except titles and headings) and 1.5 line spacing.
Length: averagely 8-12 pages of text (but not limited). The report has to be well
presented and should be typed. Submission of reports that are unprofessional in its
outlook (dirty, disorganised, inconsistent look, varying coloured paper and size) will not
fare well when marks are allocated.
The report should have a one (1”) margin all around the page as illustrated
below:
1 inch 1 inch
1 inch
1 inch
1 inch
1 inch 1 inch
The report should consist of your own work. Any ideas extracted from other
sources must be referenced and cited within the report (Harvard Referencing).
Deliverables:
1. Must submit both hardcopy and softcopy.
2. Must be comb-bound, with a clear plastic sheet on the front page.
Class Presentation:
Presentation is compulsory to all students. Each student will be given 10 – 15
minutes to complete the assignment presentation. If you fail to present the
assignment, only the documentation marks will be given.
Page 4 of 5
MARKING CRITERIA
This assignment will contribute 50%, towards the in-course assessment, as mentioned in
the Student Assessment Information Sheet (SAIS). The overall marks will be graded
based on the following criteria:
Individual Presentation: This involves confidence, presentation skill and
knowledge of the facts presented.
Report Structure: This includes appropriate sections, sub sections, proper use of
citation and referencing; following the Harvard Referencing System for all facts
and diagrams used and evidence of research and reading. Materials in report are
presented professionally using correct grammar, punctuation and spelling. Report
includes the cover page, table of content, page numbering, headings, level of
language proficiency and; proper sequencing and flow of facts in the report.
Technical Contents: This includes the systematic and in depth review of the very
recent contents on the topics using multiple sources.
MARKING SCHEME
Third
First Second Comments by
Criteria Weight Marker
Marker Marker 2nd or 3rd Markers
(if needed)
Writing, Report structure, formatting, and References 10 _____ _____ _____
Enterprise IOT TOPICS
(Evaluation & Discussion)
1. Application Infrastructure 10
2. Enabling Technologies 15
3. Business Models 10
4. Security (includes privacy, ethics &
30
acceptance)
5. Management & Governance 15
Page 5 of 5
Signature of Markers
Comments:
Academic Integrity
Copying or paraphrasing someone's work (code included), or permitting your own work to
be copied or paraphrased, even if only in part, is not allowed, and will result in
disciplinary action. Your grade should reflect your own work.
Basically, 'plagiarism' means representing someone else's work as if it is your own. This is
a very serious academic offence for all students within the University regulations, and is
particularly reprehensible for a researcher. Please do not even consider it. Remember that
accidental plagiarism (or the appearance of it) may be avoided by referencing your work
properly. This gains you credit, not loses it! The simple rule is that you must not represent
the ideas of other people (whether they are published works or the work of other students)
as your own.
The golden rule on plagiarism is DO NOT DO IT!
Please take note that Plagiarism is a serious offence and will be treated strictly as
per rules and regulations of APU.