Research Proposal Create a 5 research proposal that contains the following: •

 Description of Enterprise and Its Trusted Network (may be fictitious IT contractor company called ESS ) 

 Description of Risk Environment and Potential Abuse 

 Rationale for Research (why this problem is important to study) 

 Problem Statement (state the problem you are researching clearly and concisely) 

 Summary of Current Research (literature related to intentional abuse in trusted networks and value of Security Awareness Programs) 

 Working Bibliography (citations and annotations of at least five articles you will most likely use) Part II – Literature review – 5 pages (

 Ident​‌‍‍‍‌‍‍‍‌‍‍‍‌‌‌‌‌‌‍‍​ify five scholarly articles that have substantial relevance to your topic.

 Produce a review of this literature, summarizing the findings and conclusions, and then synthesizing the implications of this research with respect to your topic. 

Part III research paper submit an individual research paper which examines the value of a Security Awareness Program when establishing the security posture of an enterprise

. For the purposes of this paper, students should consider a Security Awareness Program which focuses on the security of the trusted network of an enterprise. The goal of such a program is to heighten manager’s awareness of risks and threats associated with intentional abuse of the t​‌‍‍‍‌‍‍‍‌‍‍‍‌‌‌‌‌‌‍‍​rusted network.