Introduction
A literature review is an essential component of any academic research, particularly in a field as complex and ever-evolving as cyber security. It provides a critical summary of what has been published on a topic by accredited scholars and researchers. This article offers a straightforward explanation of what a literature review is, why it’s necessary for your dissertation, and how it supports your research in cyber security.
What is a Literature Review?
In the simplest terms, a literature review surveys books, scholarly articles, and any other sources relevant to a particular issue, area of research, or theory. Its purpose is to provide a descriptive and analytical base of a research topic or a research problem. Here’s what makes it essential:
1. Foundation of Knowledge
A literature review establishes a foundation of knowledge on a topic, summarizing the critical aspects of existing research. It gives an overview of what’s known, what’s unknown, and what’s contested or debated in the field.
2. Identifies Research Gaps
One of the primary purposes of a literature review is to identify gaps or inconsistencies in a body of knowledge. This helps you to justify your own research and establish a niche for your work.
3. Prevents Reinvention
By reviewing what has already been done, you avoid unintentionally duplicating research that has been completed, thereby saving time and resources.
Why is a Literature Review Necessary for Your Dissertation?
Contextual Understanding
In cyber security, where the landscape is constantly shifting, a literature review helps frame the context of your research. It shows where your study fits within the broader dialogue about specific cyber threats, defense mechanisms, or technological advancements.
Demonstrates Scholarly Rigor
Conducting a thorough literature review demonstrates scholarly rigor. It shows that you have a comprehensive understanding of the research topic, including where there is consensus in the field and where questions remain open or answers are contested.
Guides Research Methodology
The insights gained from a literature review often guide the methodologies you choose in your dissertation. Understanding how previous studies approached similar problems can inform your methodological decisions, making your research robust and well-grounded.
How to Conduct a Literature Review in Cyber Security
Define Your Scope
Clearly define what aspects of cyber security you are interested in. Because of the breadth of the field, focusing your review can help manage the complexity of the information.
Search for Relevant Sources
Use academic databases like IEEE Xplore, Google Scholar, and others that house cyber security and IT journals. Always look for the most recent publications, as the field evolves quickly.
Organize and Synthesize Information
Organize the literature into themes or categories. This thematic organization helps in synthesizing the information, drawing connections between different research findings, and building a coherent narrative.
Evaluate and Analyze
Critically evaluate the sources. Discuss the strengths and weaknesses of different approaches, and highlight the most impactful studies. This critical evaluation is what distinguishes a literature review from a mere summary of articles.
Write with Clarity
Communicate your findings clearly. Use plain language to make the complex field of cyber security accessible to readers who may not have a deep background in the field.
Conclusion
A literature review is more than just an obligatory chapter in your dissertation; it’s a fundamental part of establishing the credibility and scope of your research. In cyber security, where new threats and technologies emerge rapidly, a well-conducted literature review is invaluable. It not only maps the terrain of existing knowledge but also highlights the contributions your research will make to the field.
We love to share our knowledge on current technologies. Our motto is ‘Do our best so that we can’t blame ourselves for anything“.