Find a violation of published information that describes the environment sufficiently to provide room for analysis. Identify and understand the environment, the areas of difficulty, and the cause of the problems, not just the symptoms.
The personal projects should have the expected result of impressing an employer on request to solve difficult information security risks to improve enterprise value through improved security.
Individual: Find an failure; understand the violation from a framework or thematic perspective; research the conditions (technical, formal, and informal) of the violation from a computer science, psychology, organization, etc. focus as desired by the student. Design a purpose (or claim) for the research and provide a recommendation demonstrating a degree of competency and problem solving / analysis expected from graduate students.
