Law and Digital Security 3

Because one writer used artificial intelligence to solve the question

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Required

1 – Modify the answer to avoid any copies of artificial intelligence (paraphrase to avoid AI and plagiarism)

2- Check the answers whether they are correct or not

Student name
Hamid ISSA Ahmed AL Badri
D Number
2220126
Module Title
Law and digital security
Module Leader
MS Maria Al Amri
Level
5
Semester
2
Assessment
Cybersecurity
Weighting
50%
I .Introduction.
Cybersecurity is a specialized field that focuses on safeguarding electronic systems, user data, and digital
infrastructure from electronic threats and cyberattacks. In our modern era, where reliance on technology
and digital networks is pervasive, cybersecurity has become of paramount importance in ensuring the
integrity, confidentiality, and availability of digital assets.
Importance of Cybersecurity:
1. Protection of Sensitive Information: Cybersecurity plays a crucial role in safeguarding sensitive
information and personal data for individuals and businesses. Breaches of digital systems can lead to
theft or manipulation of sensitive information, posing a significant risk to privacy and security.
2. Economic Stability: Cyberattacks can have severe economic consequences, affecting both businesses
and government entities. Protection against cyber threats contributes to maintaining economic stability
by preventing disruptions and fostering sustainable growth.
3. Preservation of Critical Infrastructure: Cybersecurity is essential for protecting critical infrastructure
such as energy, vital facilities, and water resources. Attacks on these critical infrastructures can have
catastrophic consequences, making their security crucial for maintaining essential services.
4. Safeguarding Government Networks: Most governments heavily rely on electronic networks for a
variety of purposes, ranging from providing public services to ensuring national security. Protecting
government networks is vital for maintaining the integrity of government operations and safeguarding
national interests.
5. Ensuring Business Security: Companies handle vast amounts of data and sensitive business
information. Securing this data enhances customer trust, protects corporate reputations, and ensures
the continued success of businesses.
In conclusion, cybersecurity has become a necessity to ensure the sustained development of technology
and progress in various fields, from the economy to our personal lives. As the digital landscape continues
to evolve, the importance of robust cybersecurity measures cannot be overstated, and it remains an
ongoing challenge to stay ahead of emerging cyber threats and vulnerabilities.
II. Literature Review.
A literature review on cybersecurity involves examining existing research, publications, and academic
works related to various aspects of cybersecurity. Below is a brief overview of key themes and findings
often present in the cybersecurity literature:
1. Cyber Threat Landscape:
-Researchers often explore the evolving landscape of cyber threats, including the identification and
analysis of various types of cyberattacks such as malware, phishing, ransomware, and advanced
persistent threats (APTs).
– Studies delve into the tactics, techniques, and procedures (TTPs) employed by cybercriminals, aiming
to understand their methodologies and enhance cybersecurity defenses.
2. Cybersecurity Technologies and Solutions:
– Literature reviews often cover the latest advancements in cybersecurity technologies, tools, and
solutions. This includes discussions on intrusion detection systems, firewalls, encryption methods, and
security protocols.
– Researchers assess the effectiveness of existing cybersecurity measures and propose enhancements or
new technologies to address emerging threats.
3. Human Factors in Cybersecurity: A significant portion of the literature focuses on the role of human
factors in cybersecurity. This includes studies on user awareness, training, and behavior in the context of
cybersecurity, as well as the psychological aspects of cyber threats.
4. Regulatory and Policy Perspectives: Literature reviews often explore the legal and regulatory
frameworks governing cybersecurity. This includes discussions on international cybersecurity
agreements, national cybersecurity policies, and compliance with standards such as GDPR (General Data
Protection Regulation).
5. Incident Response and Cybersecurity Governance: Research often examines the strategies and
frameworks for incident response in the event of a cybersecurity breach. Governance structures and
frameworks, such as the NIST Cybersecurity Framework, are also commonly discussed in the literature.
6. Cybersecurity Education and Workforce Development: Given the shortage of skilled cybersecurity
professionals, literature reviews often explore initiatives and strategies for cybersecurity education and
workforce development. This includes discussions on academic programs, certifications, and training
approaches.
7. Emerging Technologies and Trends: Researchers explore emerging technologies that impact
cybersecurity, such as the Internet of Things (IoT), artificial intelligence (AI), and blockchain. The
literature often discusses the potential security challenges associated with these technologies.
8. Cybersecurity Metrics and Evaluation: Evaluating the effectiveness of cybersecurity measures is a
common theme. Researchers often discuss the development of metrics for assessing cybersecurity
readiness, measuring the impact of incidents, and benchmarking cybersecurity performance.
9. International Collaboration and Information Sharing: Collaboration between nations and information
sharing among cybersecurity professionals are often explored in the literature. This includes discussions
on the challenges and opportunities associated with sharing threat intelligence globally.
10. Ethical and Legal Implications: The literature often addresses ethical considerations in cybersecurity
research and practices. Discussions include the ethical implications of hacking, vulnerability disclosure,
and the legal aspects of cybersecurity research.
When conducting a literature review on cybersecurity, it’s crucial to consider the interdisciplinary nature
of the field, incorporating perspectives from computer science, law, psychology, and other relevant
disciplines. Additionally, staying updated with the latest research is essential in this rapidly evolving field.
Characteristics Kali Linux
Metasploit
Definition
It is a system designed to run ethical hack It is a framework and is used for
prevention and security testing
penetration tests written in the puby
language
function
It runs a wide range of tools to test the
security breach
Allows to provide a system for the
development of a hack attack
Tools usage
He has 600 tools used in the hack test
Used in security testing
reliability
Designed to use it to test vulnerabilities
and activities that lead to hacking
Strong and flexible
relationship
Linked with other systems
Works the same as other systems
III. Analysis / Discussion.
The role of data privacy and ethical considerations is paramount in the context of big data-driven
initiatives. Big data, characterized by the processing and analysis of vast and diverse datasets, has the
potential to provide valuable insights and drive innovation across various domains. However, the
collection and use of large volumes of personal and sensitive information raise significant concerns
related to privacy and ethical implications. Here are key aspects to consider:
1. Informed Consent: Obtaining informed consent from individuals whose data is being collected is a
fundamental ethical consideration. It involves clearly communicating the purpose of data collection, how
the data will be used, and any potential risks associated with its use. Users should have the choice to opt
in or opt out, and their consent should be obtained in a transparent and understandable manner.
2. Data Anonymization and De-Identification: Anonymizing or de-identifying data is a critical step in
preserving privacy. Stripping personal identifiers from datasets helps mitigate the risk of re-identification
and protects individuals from unauthorized disclosure of sensitive information.
3. Data Minimization: The principle of data minimization emphasizes collecting only the data necessary
for a specific purpose. This approach reduces the amount of sensitive information held, lowering the risk
of unauthorized access or misuse.
4. Security Measures: Implementing robust security measures is essential to protect big data repositories
from unauthorized access, data breaches, and cyber threats. Ethical considerations include ensuring the
confidentiality, integrity, and availability of the data throughout its lifecycle.
5. Fairness and Bias Mitigation: Big data analytics can inadvertently perpetuate biases present in the
underlying datasets. Ethical considerations involve identifying and mitigating biases to ensure fair and
equitable outcomes. This is particularly crucial in applications like hiring, lending, and criminal justice,
where biased algorithms can lead to unfair consequences.
6. Transparency and Accountability: Organizations utilizing big data should be transparent about their
data practices, algorithms, and decision-making processes. Establishing accountability mechanisms,
including clear lines of responsibility for data handling, helps build trust with users and stakeholders.
7. Data Governance and Compliance: Adhering to data protection laws and regulations, such as GDPR
(General Data Protection Regulation) or CCPA (California Consumer Privacy Act), is not only a legal
requirement but also an ethical responsibility. Organizations must establish strong data governance
frameworks to ensure compliance with relevant privacy regulations.
8. Ethical Use of Predictive Analytics: Big data-driven predictive analytics can have significant societal
impacts. Ethical considerations involve assessing the potential consequences of predictions and ensuring
that the application of analytics aligns with ethical standards and social values.
9. Safeguarding Individual Rights: Respecting individual rights, including the right to access, correct, and
delete personal data, is crucial. Organizations must provide mechanisms for individuals to exercise these
rights, contributing to a culture of respect for privacy.
10. Ongoing Monitoring and Evaluation: Ethical considerations extend beyond the initial implementation
of big data initiatives. Regular monitoring and evaluation of data practices, algorithms, and outcomes are
essential to identify and address emerging ethical challenges. In conclusion, the responsible and ethical
use of big data requires a comprehensive approach that prioritizes data privacy, transparency, fairness,
and accountability. Organizations must proactively address these considerations to ensure that the
benefits of big data are realized without compromising individual rights or societal values.
IV. Conclusion.
Leveraging big data analytics can significantly enhance cybersecurity effectiveness by providing advanced
threat detection, real-time monitoring, and actionable insights. Here are recommendations for
maximizing the benefits of big data analytics in cybersecurity:
1. Comprehensive Data Collection: Collect and integrate data from diverse sources, including network
logs, endpoint data, user behavior, and external threat intelligence feeds. Comprehensive data collection
enables a holistic view of the organization’s digital environment, aiding in the detection of anomalous
activities.
2. Real-time Monitoring and Analysis: Implement real-time monitoring capabilities to detect and
respond to cyber threats as they occur. Big data analytics can process and analyze massive datasets in
near-real-time, allowing for swift identification of security incidents and proactive response measures.
3. Machine Learning and AI Integration: Integrate machine learning and artificial intelligence (AI)
algorithms into the analytics framework to enhance the accuracy of threat detection. These technologies
can identify patterns, anomalies, and potential security risks more effectively than traditional rule-based
systems.
4. Behavioral Analytics: Utilize behavioral analytics to establish baselines for normal user and system
behavior. Deviations from these baselines can indicate potential security threats, such as insider threats
or compromised accounts, allowing for early detection and response.
5. Threat Intelligence Integration: Integrate threat intelligence feeds into the analytics platform to stay
updated on the latest cyber threats and attack vectors. This enables the system to correlate internal data
with external threat intelligence, enhancing the organization’s ability to identify emerging threats.
6. Automated Incident Response: Implement automated incident response mechanisms based on
predefined playbooks. Big data analytics can facilitate the automation of response actions, such as
isolating compromised systems, blocking malicious IP addresses, or updating firewall rules.
7. Data Encryption and Anonymization: Prioritize data encryption and anonymization to protect sensitive
information during analysis. This ensures that even if data is intercepted, it remains secure and complies
with privacy regulations.
8. Scalable Infrastructure: Build a scalable infrastructure that can handle the volume and velocity of big
data. Cloud-based solutions can provide the flexibility and scalability needed for efficient data storage
and processing.
9. User and Entity Behavior Analytics (UEBA): Implement UEBA to analyze patterns of behavior at the
user and entity level. This helps in detecting anomalies that may indicate compromised accounts or
malicious activities.
10. Continuous Monitoring and Assessment: Establish continuous monitoring practices to keep pace
with evolving threats. Regularly assess and update the analytics models, algorithms, and rules to adapt
to new attack vectors and tactics.
11. Collaboration and Information Sharing: Foster collaboration with industry peers and share threat
intelligence information. Collective efforts contribute to a more robust defense against advanced and
sophisticated cyber threats.
12. User Training and Awareness: Enhance user training and awareness programs to educate employees
about cybersecurity best practices. Informed users are better equipped to recognize and report potential
security incidents.
13. Regulatory Compliance: Ensure that the big data analytics processes align with relevant regulatory
requirements, such as GDPR, HIPAA, or industry-specific standards. This helps avoid legal and compliance
issues associated with data protection.
14. Regular Security Audits: Conduct regular security audits to assess the effectiveness of the big data
analytics implementation. Evaluate the accuracy of threat detection, response times, and overall system
performance.
By implementing these recommendations, organizations can harness the power of big data analytics to
bolster their cybersecurity posture, proactively identify and mitigate threats, and ultimately strengthen
their resilience against a rapidly evolving threat landscape
V. Reference List.
Available: URL Example References [29]“Canadian Honeynet Chapter.” Canadian Institute
of Cybersecurity. Accessed: Jul. 9, 2021. [Online]. Available:
http://www.unb.ca/cic/research/honeynet.html [Reference number]”Title of web page.” Title
of website. Accessed: date. [Online]. Available: UR Web pages with individual authors Web
pages with organizations as authors. Http://www.mohyssin.com/forum/showthread.php?t=6548 3.
Dye, M., & McHugh, J. (2019). _Computer and Information Security Handbook_. Morgan Kaufmann.
Pipkin, DL (2000). Information Security – Protecting the Global Enterprise, USA: HP Professional Series6.
NIST Special Publication 800-53 Revision
Michael E. Whitman, Herbert J. Mattered (2012) Principles Of Information Security, Fourth Edition, USA:
Cengage Learning.
Joro, Yeezus Balcha (2011). Information System Security Audit Readiness -Case study: Ethiopian
Government Organizations, Unpublished Master Thesis, Sweden: Stockholm University & Royal Institute
of Technology.8. Clarke, R., Knake, R. K., & Healey, J. K. (2010). _Cyber War: The Next Threat to National
Security and What to Do About It_. HarperCollins.
Module Code
Module Title
Module Credits
GIS5007
Law and Digital Security
20
Academic Year and Semester Examination Board
Level & Block
2023-24, 1st Semester
L5-B2
January 2024
Method of Assessment
Term
Weighting
WRIT2
End-term
50%
Module Leader
Module Leader email
Ms. Marya AL Amri
marya@gulfcollege.edu.om
Additional Information (if any)
This coursework is to be completed individually.
Equivalent to 2000 words.
Click or tap here to enter text.
Page 1 of 14
Contents
CONTENTS ……………………………………………………………………………………………………. 2
ASSESSMENT DETAILS …………………………………………………………………………………….. 3
SUBMISSION DETAILS ……………………………………………………………………………………… 5
ASSESSMENT CRITERIA ……………………………………………………………………………………. 5
FURTHER INFORMATION ……………………………………………………………………………….. 11
Who can answer questions about my assessment? …………………………………………………….. 12
Referencing and independent learning (Not applicable for Examination) ………………………… 12
Technical submission problems (Not applicable for Examination) ………………………………….. 12
Mitigating circumstances ……………………………………………………………………………………….. 12
Unfair academic practice ……………………………………………………………………………………….. 12
How is my work graded? ………………………………………………………………………………………… 13
IV FORMS……………………………………………………………. Error! Bookmark not defined.
Click or tap here to enter text.
Page 2 of 14
Assessment Details
Assessment title
Abr.
Weighting
Reflective Assignment
WRIT2
50%
Pass marks for undergraduate work is 40%, unless stated otherwise.
Task/assessment brief:
Assignment Overview:
Utilising the Power of Big Data Analytics to Strengthen Cybersecurity
Big data refers to massive, complicated datasets from various sources, such as social media, IoT devices, sensors, and
online transactions. Due to its ability to deliver valuable insights and enhance decision-making processes in various
fields, the analysis of large datasets has gained prominence in recent years. In cybersecurity, big data analytics is vital
in bolstering defences against changing threats and safeguarding sensitive data.
Organisations can improve their capacity to identify, prevent, and respond to cyberattacks by employing big data
analytics in cybersecurity. The large volume of network-generated data can be utilised to uncover patterns,
abnormalities, and potential compromise signs. This enables proactive threat identification and allows cybersecurity
professionals to respond effectively and quickly. Jang-Jaccard, J., Nepal, S., & Chen, S. (2014). Big data analytics for cyber
security. In Proceedings of the
10.1109/BigData.Congress.2014.18
2014
IEEE
International
Congress
on
Big
Data
(pp.
94-101).
IEEE.
doi:
Tasks:
Critical review, summarize and evaluate the topic on the following outline:
1. Evaluation of Big data analytics and how its strengthen cybersecurity.
2. Key concepts and challenges in big data analytics for cybersecurity tools.
3. Compare two data sets which are used to implement cybersecurity tools.
4. Review of existing research in big data-driven cybersecurity.
5. Perform analysis of big data analytics techniques for threat detection and prevention. Discuss the
role of data privacy and ethical considerations in big data-driven cybersecurity.
Report Format and Content Requirement
I.
II.
Introduction. In this section, write an introduction about Big data analytics and its importance in
cybersecurity. Include research objective(s) and scope. Your introduction should be at least two
paragraphs long (about 300 words), refer to task 1. Also, properly paraphrase and/or write at least two
in-text citations in this section.
Literature Review. This section is an evaluative report of information based on printed and/ or online
sources. The review should contain a description, summary, evaluation, and comparison of the study
with previous research on cybersecurity and big data. Support this section with properly referenced
citations. If you present this section in a tabular format, precede the table with a short introductory
paragraph, and refer to tasks 2-4.
III.
Analysis / Discussion. In this section, performs an analysis of big data analytics techniques for threat
Click or tap here to enter text.
Page 3 of 14
IV.
V.
detection and prevention. Discuss the role of data privacy and ethical considerations in big data-driven
cybersecurity, and refer to task 5.
Conclusion. This section of the report should include a summary of key findings from the analysis and
discussion. Recommendations for leveraging big data analytics to enhance cybersecurity effectiveness.
Reference List. List down all the references you cited in the report using the Harvard style of referencing.
Make sure that the references you listed match the citations you made in the report.
Additional instructions:
• Your student identification number must be clearly stated at the top of each page of your work.
• Where appropriate, a contents page, a list of tables/figures, and a list of abbreviations should precede your
work.
• Each page must be numbered.
• Please use Calibri font
o size 14, bold for main titles
o size 12, bold for subtitles
o size 11, regular for the body of each section
o size 9, and italics for the image, chart or graph captions or labels
• All referencing must adhere to Institutional requirements (Harvard Referencing Style).
• A word count must be stated at the end of your work.
• All tables and figures (if there are any) must be correctly numbered and labelled.
• Upload your partial outputs to MS Teams for formative feedback.
• Your final report must be uploaded to Turnitin for plagiarism checking; college rules on plagiarism apply.
*************
Word count (or equivalent):
2000 words
This is a reflection of the effort required for the assessment. Word counts will normally include any text, tables,
calculations, figures, subtitles, and citations. Reference lists and contents of appendices are excluded from the word
count. Contents of appendices are not usually considered when determining your final assessment grade.
Click or tap here to enter text.
Page 4 of 14
Submission Details
Submission
Deadline:
Submission
Time:
END-TERM:
7th of December 2023
Estimated Feedback
Return Date
After the result
announcement (10 working
days) – January 2024 EB
9:00 PM
Turnitin:
Any assessments submitted after the deadline will not be marked and will be recorded as a
non-attempt unless you have had an extension request agreed upon or have approved
mitigating circumstances. See the Gulf College website for more information on submission
details and mitigating circumstances.
File Format:
The assessment must be submitted as a Word document and submitted through the Turnitin
submission point.
Your assessment should be titled with your:
Student ID number, Module code and Assessment ID,
e.g. 1610200 GIS5007 WRIT2
Feedback
Feedback for the assessment will be provided electronically via Turnitin / MS Teams / Face to
Face. Feedback will be provided with comments on your strengths and the areas in which you
can improve. Module tutors give students two types of assessment feedback: formative, which
is given when the student is working on the completion of an assignment or coursework, and
summative, which is given upon completion of the module. Comprehensive assessment
feedback on your performance will be given after the announcement of the results. (10
Working Days)
Assessment Criteria
Learning outcomes assessed
On successful completion of the module, a student should be able to:



Demonstrate understanding of the management of data from a legal and ethical context.
Evaluate aspects of security and the forensic analysis of data.
Synthesise the wider application of cloud computing and big data analysis.
In addition, the assessment will test the following learning outcome:
• Evaluate aspects of security and the forensic analysis of data.
• Synthesise the wider application of cloud computing and big data analysis.
Click or tap here to enter text.
Page 5 of 14
Marking Scheme
Max.
Marks
Item
Criteria
10
Introduction
Big Data analysis introduction and its importance in
cybersecurity.
Research objective and scope.
5
Literature
Review
15
Key concepts and challenges in big data analytics for the
cybersecurity tools.
Compare two data sets which is used to implement cybersecurity
tools.
Review of existing research in big data-driven cybersecurity.
Analysis/
Discussion
Report
Structure
and
Formatting
10
10
Analysis of big data analytics techniques for threat detection and
prevention.
Discuss the role of data privacy and ethical considerations in big
data-driven cybersecurity.
15
30
15
10
Recommendations for leveraging big data analytics to enhance
cybersecurity effectiveness.
The report should be well-formatted, with consistent headings,
subheadings, and numbering. Fonts, spacing, and margins should
be consistent and professional-looking, including Harvard
referencing style.
20
10
5
Total Marks
Click or tap here to enter text.
30
10
The summary of key findings from the analysis and discussion.
Conclusion
Total
5
100
Page 6 of 14
Marking Criteria
Grade
% Mark
0
1–9
10 – 19
F
(Fail)
20 – 29
30 – 39
D
(Third)
40 – 49
C
(Lower
Second)
50 – 59
Requirements
No answer has been attempted or evidence of unfair practice.
The work presented for assessment may be incomplete and/or irrelevant and demonstrates a
serious lack of comprehension and/or engagement with the set task. Attainment of the learning
outcomes is minimal and assessment criteria are not addressed.
Misunderstanding or misinterpretation of the set task, providing a short and/or largely irrelevant
response. Consequently, no learning outcomes are met in full although there may be minimal
attainment of about one or two.
Minimal understanding of the set task and will partially have met some of the learning outcomes.
Little knowledge and understanding of the field of study relevant to the task. The limited ability is
shown to communicate simple concepts and/or information. Significant difficulties in the report’s
structure and organisation detract from the clarity and meaning overall. Evidence of individual
reading and investigation is negligible, and the limited referencing of literature and other sources is
frequently inaccurate. Demonstrates some ability to describe and report but very little evidence is
available to indicate an ability to engage in critical evaluation and reflection.
Partial understanding of the set task and some of the associated learning outcomes met at a basic
level. Factual inaccuracies, errors, and misconceptions are evident in important areas and elements
of the assessed work may be irrelevant to the task. If attempted, the presentation of arguments and
more complex ideas may be confused and clumsily expressed. Some enquiry and analysis relevant
to the task attempted but outcomes may be naïve, simplistic, and/or unconvincing. Demonstrates
limited knowledge of current research/scholarship in the discipline. A restricted range of sources is
used but overall, there is an over-reliance on program materials with little evidence of individual
reading and investigation. There are frequent errors in the referencing of literature and other
sources. The work is largely descriptive and arguments, if attempted, are rarely substantiated.
Demonstrates a basic understanding of the set task and an ability to have met the associated
learning outcomes and addresses the assessment criteria at a threshold level. Displays a basic
knowledge and understanding of many aspects of the field of study relevant to the task.
Reproduction of information received from elsewhere (e.g., program materials). Errors and
misconceptions will be evident, but these are outweighed by the degree of knowledge and
understanding demonstrated overall. More success is achieved in describing and reporting
information rather than communicating complex ideas. Generally, the work is appropriately
structured although key points may not be logically sequenced. Some limited analysis and enquiry
relevant to the task/discipline included and has intermittent success in presenting and commenting
on outcomes. A limited ability to critically evaluate and reflect. Although some critical reflection is
evident, the balance within the work is likely to be in favour of description and factual presentation.
A secure understanding of the set task and an ability to have met the associated learning outcomes
and address the assessment criteria at a satisfactory level. Displays a sound knowledge and
understanding of most key aspects of the field of study relevant to the task and there is some
evidence of an ability to apply such knowledge. Some evidence of independent thinking beyond
programme notes. Overall, the structure and format of the work are appropriate. Occasional faults
in the presentation of work, but overall, these do not detract from the clarity of expression.
Examples of research/scholarship referred to in the work demonstrate individual reading and
investigative ability to critically evaluate and reflect although there may be some over-reliance on
description and factual presentation. Arguments are usually substantiated.
Click or tap here to enter text.
Page 7 of 14
B
(Upper
Second)
60-69
70 – 79
A
(First)
80 – 89
90 – 100
Demonstrates a full understanding of the set task and an ability to have met the learning outcomes
and address the assessment criteria at a good level. Detailed knowledge and thorough
understanding of the key aspects of the field of study relevant to the task are shown. There is clear
evidence of an ability to apply such knowledge and, in some contexts, to extend and transform it.
Discussion of complex concepts is often tackled successfully and there is evidence of independent
thinking. Displays an ability to communicate information, ideas, and concepts clearly and succinctly.
The work is well presented and the format appropriate. Key points are appropriately organised, the
writing style is fluent, and the arguments are well articulated. Detailed analysis and critical enquiry
relevant to the task/discipline is undertaken by making use of appropriate techniques and has
considerable success in presenting and commenting on outcomes. There is some linkage between
theory and practice. Examples referred to indicate a breadth and depth of individual reading and
investigation that extend beyond the sources provided. The referencing of literature and other
sources is almost always accurate. Arguments are considered and substantiated and there is
evidence of an ability to make appropriate judgements and to suggest solutions to problems.
Demonstrates a full and detailed understanding of the set task and an ability to have met the
learning outcomes and address the assessment criteria at a very good level. Detailed knowledge
and systematic understanding of key aspects of the field of study relevant to the task are evident.
There is strong evidence of an ability to extend, transform, and apply such knowledge. The student
also demonstrates an ability to engage in a confident discussion of complex concepts and to
recognise the limitations and ambiguity of disciplinary knowledge. Independent thinking and
original insights are also present in the report. The ability is shown in communicating information,
complex ideas, and concepts coherently and succinctly. The standard of presentation is high and the
format appropriate. Key points are logically organised and in written work, the style is lucid and
mature. Detailed and thorough knowledge of current research/advanced scholarship in the
discipline. The use of scholarly reviews/primary sources is confident and a breadth and depth of
individual reading and investigation, extending beyond the sources provided, is apparent. The
referencing of literature and other sources is accurate and in line with academic conventions. An
ability to engage in critical evaluation of concepts/arguments/data and to make appropriate and
informed judgements is shown. Arguments are well developed, sustained, and substantiated.
Where relevant, assumptions are challenged and there is a clear recognition of the complexities of
academic debate. Appropriate and sometimes innovative solutions are offered to problems.
Beyond the above, a full and detailed understanding of the set task and an ability to have met the
learning outcomes and address the assessment criteria at an excellent level is displayed.
Beyond the above, demonstrates a full and detailed understanding of the set task and an ability to
have met the learning outcomes and address the assessment criteria at an out level. Work is of a
standard deemed to be worthy of publication Reference citations extend significantly beyond the
main body of reading normally expected in the discipline/field of study.
Click or tap here to enter text.
Page 8 of 14
AY: Click or tap here to enter text. / 1st Semester
Marking Criteria/Rubrics
Criteria
Introduction
Literature
Review
Analysis and
Discussion
Not Attempted/
Irrelevant (1)
Needs
Improvement
(1)
Satisfactory (2)
Good (3)
Very good (4)
Excellent (5)
Not Attempted/
Extremely shown
with significant
errors
Limited
knowledge, with
many errors’
misconceptions,
and gaps.
Detailed, accurate, and relevant.
Key points highlighted.
Demonstrates systematic
understanding of all key aspects
of the topic and excellent
breadth and depth of knowledge.
Appreciating any ambiguities in
the area of legal study. Strong
ability to apply legal knowledge
to the key issues of the task legal
study.
No evidence that
any reading of the
subject matter/
around the
subject matter
was undertaken.
No referencing is
used at all or is
frequently
inaccurate.
Sound knowledge and
understanding of key topics.
May be a tendency to
reproduce information
received from elsewhere
(e.g. programme materials).
A few errors or
misconceptions may be
present, but not in
important areas. Some
evidence of ability to apply
core legal principles.
Tendency to rely on core
materials and information
provided by tutors although
evidence of some individual
reading. Minor
inconsistencies and
inaccuracies in referencing
using the Harvard system.
Detailed, accurate,
relevant. Shows a
thorough understanding
of key aspects of the
topic. Discussion of more
complex legal issues uses
often tackled successfully.
Not Attempted /
Irrelevant sources
Material from a variety of
sources is used extending
beyond those sources
provided, demonstrating
some synthesis of
information. Referencing
relevant and most
accurate using the
Harvard system.
A wide variety of sources used
extends well beyond programme
material, showing a strong ability
to synthesise. Academic and
textbook referencing is clear,
relevant and consistently
accurate using the Harvard
system.
Not Attempted/
Irrelevant sources
Little or no
evidence of being
able to undertake
analysis. Fails to
identify or
evaluate different
perspectives or
arguments.
Inconclusive or
lacks an
Demonstrates basic
knowledge and
understanding,
reproducing
information is a
frequent feature.
Errors or
misconceptions will
be evident but
outweighed by the
overall
understanding.
Over-reliance on
materials provided
by the tutor. Little
or no evidence of
reading around the
subject. Referencing
present but contains
inconsistencies and
some inaccuracies,
overall Harvard
system used.
Fairly superficial and
generally derivative,
the balance of work
is in favour of
description and
factual
presentation. Some
evidence is
mentioned, but not
generally integrated
At times demonstrates an
ability to undertake analysis.
Evidence of findings and
conclusions are usually
grounded in appropriate
legal authority. Arguments
are usually substantiated.
Some over-reliance on
description and factual
presentation.
Able to undertake
detailed legal analysis,
good development of
arguments which are
substantiated. Most
points are illustrated with
relevant evidence. Good
evidence of evaluation
and ability to make
appropriate judgments.
Analytical and clear conclusions
are well-grounded in legal
doctrine and authority, possibly
showing the development of new
and innovative solutions to legal
problems. Key points supported
with legal authority, and
alternative perspectives are
critically evaluated. Comments
perceptively on the application of
Click or tap here to enter text.
Page 9 of 14
Criteria
Conclusion
Report
Structure and
Formatting
Not Attempted/
Irrelevant (1)
Needs
Improvement
(1)
Satisfactory (2)
appropriate
conclusion.
into the work or
evaluated, although
there may be some
limited attempts at
legal analysis and
evaluation.
Not
Attempted/Irreleva
nt
None or only one
of the main points
is summarised.
One or two main
points are
summarised but in a
manner that is
vague or too
general.
Two to three main points are
summarised with some
success. May I have one or
two issues with organisation,
but not to the point of being
a hindrance
The report has no
discernible
structure or
formatting, making
it difficult to
navigate and
comprehend.
The report lacks a
clear structure
and formatting,
making it
challenging to
follow the main
points.
The report has a
basic structure, but
the organisation and
formatting need
improvement for
better readability.
The report has a generally
appropriate structure with
headings, subheadings, and
formatting, but with some
inconsistencies or lack of
clarity.
Click or tap here to enter text.
Good (3)
Very good (4)
Excellent (5)
legal authority to practical
problems.
Page 10 of 14
The conclusion somehow
captures the focus of the
research paper;
summarises the main
points (aspects) of the
research paper but needs
further elaboration.
The conclusion provides a
recommendation.
The conclusion includes an
ending comment that
inspires the reader to
continue thinking about
your topic.
The report has a clear
structure with appropriate
headings, subheadings,
and formatting, with
minor inconsistencies.
All the main points are
summarised with skills and
knowledge; all points are fell in
line and led up to an inevitable
conclusion
The report demonstrates a wellstructured format with
appropriate headings,
subheadings, and formatting.
Further Information
Click or tap here to enter text.
Page 11 of 14
Who can answer questions about my assessment?
Questions about the assessment should be directed to the staff member who has set the
task/assessment brief. This will usually be the Module tutor. They will be happy to answer any queries
you have.
Referencing and independent learning (Not applicable for Examination)
Please ensure you reference a range of credible sources, with due attention to the academic literature in
the area. The time spent on research and reading from good quality sources will be reflected in the
quality of your submitted work.
Remember that what you get out of university depends on what you put in. Your teaching sessions
typically represent between 10% and 30% of the time you are expected to study for your degree. A 20credit module represents 200 hours of study time. The rest of your time should be taken up by selfdirected study.
Unless stated otherwise you must use the HARVARD referencing system. Further guidance on
referencing can be found in the on Moodle. Correct referencing is an easy way to improve your marks
and essential in achieving higher grades on most assessments.
Technical submission problems (Not applicable for Examination)
It is strongly advised that you submit your work at least 24 hours before the deadline to allow time to
resolve any last minute problems you might have. If you are having issues with IT or Turnitin you should
contact the IT Helpdesk on (+968) 92841521/ 92841217. You may require evidence of the Helpdesk call
if you are trying to demonstrate that a fault with Turnitin was the cause of a late submission.
Mitigating circumstances
Short extensions on assessment deadlines can be requested in specific circumstances. If you are
encountering particular hardship which has been affecting your studies, then you may be able to apply
for mitigating circumstances. This can give the teachers on your programme more scope to adapt the
assessment requirements to support your needs. Mitigating circumstances policies and procedures are
regularly updated. You should refer to your Academic Advisor for information on extensions and
mitigating circumstances.
Unfair academic practice
Cardiff Met takes issues of unfair practice extremely seriously. The University has procedures and
penalties for dealing with unfair academic practice. These are explained in full in the University’s Unfair
Click or tap here to enter text.
of 14
Page 12
Practice regulations and procedures under Volume 1, Section 8 of the Academic Handbook. The Module
Leader reserves the right to interview students regarding any aspect of their work submitted for
assessment.
Types of Unfair Practice, include:
Plagiarism, which can be defined as using without acknowledgement another person’s words or ideas
and submitting them for assessment as though it were one’s own work, for instance by copying,
translating from one language to another or unacknowledged paraphrasing. Further examples include:
• Use of any quotation(s) from the published or unpublished work of other persons, whether
published in textbooks, articles, the Web, or in any other format, where quotations have not been
clearly identified as such by being placed in quotation marks and acknowledged.
• Use of another person’s words or ideas that have been slightly changed or paraphrased to make it
look different from the original.
• Summarising another person’s ideas, judgments, diagrams, figures, or computer programmes
without reference to that person in the text and the source in a bibliography/reference list.
• Use of assessment writing services, essay banks and/or any other similar agencies (NB. Students are
commonly being blackmailed after using essay mills).
• Use of unacknowledged material downloaded from the Internet.
• Re-use of one’s own material except as authorised by your degree programme.
Collusion, which can be defined as when work that that has been undertaken with others is submitted
and passed off as solely the work of one person. Modules will clearly identify where joint preparation
and joint submission are permitted, in all other cases they are not.
Fabrication of data, making false claims to have carried out experiments, observations, interviews or
other forms of data collection and analysis, or acting dishonestly in any other way.
How is my work graded?
Gulf College uses Cardiff Metropolitan University’s Generic Band Descriptors (GBD), in conjunction with
programme-specific and/or assessment-specific descriptors that are developed in accordance with the
principles underpinning the generic descriptors, as a reference in marking student work outputs. This is
to ensure that marking is consistent across all Cardiff Met students’ work, including the work outputs of
students in Gulf College.
Assessment marking undergoes a meticulous process to make sure that it is fair and truly reflects the
performance of students in their modules. Marking of work at each level of Cardiff Met degree
programmes are benchmarked against a set of general requirements set out in Cardiff Met’s Guidance
on Assessment Marking.
https://www.cardiffmet.ac.uk/registry/academichandbook/Documents/AH1_04_03.pdf
Click or tap here to enter text.
of 14
Page 13
To find out more about assessments and key academic skills that can have a significant impact on your
marks, download and read your Module Handbook from Moodle and your Programme Handbook from
the college website.
Click or tap here to enter text.
of 14
Page 14

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Still stressed with your coursework?
Get quality coursework help from an expert!