Monday, August 26, 2019

TECHNIQUES FOR THE PREVENTION OF SOFTWARE PIRACY Essay

TECHNIQUES FOR THE PREVENTION OF SOFTWARE PIRACY - Essay Example You need to add a specific section on Scope (break Aim and Scope into 2 distinct sections – Aim and Objectives, and Scope). Aim and Objectives must have a specific Aim and then Objectives to achieve the Aim. Scope should include that you are only considering; 1 YOU NEED TO WORK ON THIS1. Section 2.1-> You state that both qualitative and quantitative methods were employed to deduce the facts. Firstly this section states how the work is to be done so you should change the tense of everything in this section to read ‘are to be employed’. Secondly you need to explain more specifically which methods you employed fall into these categories. 3 OK2. Section 2.2. -> You must add some critical assessment of techniques. Currently only good points selected for web and email. Comparison and contrast required. What other techniques are available and why did you choose email against them. What are the potential limitations of email? 1 4. Section 2.4. -> You should rethink validation of the framework. How are you going to test the basis of the framework? For example, you identify factors from literature, but are all the relevant factors currently included? 1 OKa. You state that ‘This research to analyse the various types of software piracy that are briefed above †¦Ã¢â‚¬â„¢. Where is this analysis in the work? Either reword this sentence or add the analysis. 1 OKa. Cost towards bottom of page. Is this per seat or development costs? You need to provide a better discussion of cost and understand the specific types of cost which might be incurred. Cost is too broad a heading. 1 a. Time Limitation -> this is not a technology but a feature. Many of the technologies can include this feature. This should be discussed as a potential feature and then the technologies reviewed against the feature i.e. can they support it? This will also require changes to the framework. 2 YOU NEED TO WORK ON THISb. Each choice node requires some discussion,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.