Chat with us, powered by LiveChat Introduction & Background – 3-4 pages / 3 hours – zero plagiarism |

Using guidelines need Introduction & Background – 3-4 pages.

Residency Assignment


ITS831 Information Technology Importance in Strategic Planning


Your team will conduct a literature review in Information Technology

You are to review the literature on IT and discuss problems and gaps that have been identified in the literature. You will expand on the issue and how researchers have attempted to examine that issue by collecting data – you are NOT collecting data, just reporting on how researchers did their collection.

As you read the literature, it will become apparent that there are multiple issues, pick one issue that stands out in the literature and agree on that as a Team to address that.

The total paper should be about 10 pages double-spaced, not counting cover and reference pages.


Include the names of those who participated in the project

Table of contents:
Use a Microsoft Enabled Table of Contents feature.

Describe the issue, discuss the problem, and elaborate on any previous attempts to examine that issue.

Research Questions:
In your identified problem area that you are discussing, what were the research questions that were asked?

What approach did the researcher use, qualitative, quantitative, survey, case study? Describe the population that was chosen.

Data Analysis:
What were some of the findings, for example, if there were any hypotheses asked, were they supported?

What was the conclusion of any data collections, e.g., were research questions answered, were hypotheses supported?

Here you can expand on the research and what the big picture means, how do the results found in the literature review help organizations in the Information Technology strategy planning. What do you see as long-term impacts and what further research could be done in the field?

Include at least ten scholarly references in APA format.




Your presentation will have a slide that addresses each
· Cover
· Topic
· Background of the problem
· Research Questions (if any)
· Methodology
· Data Analysis
· Conclusion
· Discussion
· References

Enhancing IoT Security with Blockchain

by Chunchi Liu

B.Sc. in College of Information Science and Technologies, July 2017,
Beijing Normal University

A Dissertation submitted to

The Faculty of
The School of Engineering and Applied Science

of The George Washington University
in partial satisfaction of the requirements

for the degree of Doctor of Philosophy

August 31, 2020

Dissertation directed by

Xiuzhen (Susan) Cheng
Professor of Computer Science




The School of Engineering and Applied Science of The George Washington

University certifies that Chunchi Liu has passed the Final Examination for

the degree of Doctor of Philosophy as of August 25, 2020. This is the final

and approved form of the dissertation.

Enhancing IoT Security with Blockchain

Chunchi Liu

Dissertation Research Committee:

Xiuzhen (Susan) Cheng, Professor of Computer Science, Disser-
tation Director

Abdou Youssef, Professor of Engineering and Applied Science,
Committee Chair

Hyeong-Ah Choi, Professor of Engineering and Applied Science,
Committee Member

Wei Cheng, Assistant Professor, University of Washington, Com-
mittee Member


© Copyright 2020 by Chunchi Liu
All rights reserved



Is it just me or all PhD students question about their life choices?


However, it is lucky for me to have a highly encouraging and supportive

PhD advisor, many intellectually active research fellas of the same interest,

and also many professors, friends and families to help me get over this

extraordinarily hard time of pursuing science.

Prof. Xiuzhen Cheng, Yinhao, Minghui, Huqin, Guangtou, Yawei, Yizhen,

Prof. Yerukhimovich and all other friends and families, thank you. I wouldn’t

finish this if I were alone.



Enhancing IoT Security with Blockchain

This thesis explores the emerging technology of blockchain and its appli-

cations in IoT. Blockchain is an interdisciplinary technology build on top

of Cryptography, Distributed Systems and Computer Network. It creates

a secure environment that allows some certain types operations and inter-

actions among participants to be trustworthy. It establishes security on

top of objective cryptographic assumptions and security proofs, instead of

subjective trust assumptions.

In this thesis, we first narrate our understanding on blockchain, then

present our exploratory works on using blockchain to enhance IoT and real-

life security. The first work is Normachain, where we allow the supervisors

to search for illegal information on top of encrypted blockchain transactions

without decrypting it, thus preserving the confidentiality of the transaction

content at the same time. The second work is Tokoin, where we design a

coin-based access control scheme to address the long-existing overprivilege

challenge and weak auditability problem in the field of IoT access control.

In the third work we extend on-chain trust to off-chain by achieving the real


error: Content is protected !!