Any views expressed within media held on this service are those of the contributors, should not be taken as approved or endorsed by the University, and do not necessarily reflect the views of the University in respect of any particular issue.
Crime, technology and society by Angus Bancroft
 
Writing the further work bit

Writing the further work bit

You know that bit at the end of your dissertation or research paper where you suggest what could be done next, and which is always the last thing everyone writes and which you give less thought to than a status update on Insta? You are doing it wrong. Typically these sections are either written in Fantasy Project style, imagining some other study that is not going to happen, or Fill in the Blanks, suggesting some tweaks to sampling or doing more of what you had done. Stop doing that. Nobody cares. Do not waste space imagining some new project. You will never do it. Stop pretending you will ever go back and fix the project that is now in the rear view mirror.

Instead, make some plans that are achievable. Identify other datasets that yours can be linked to. This gives you opportunities for further writing, looking at how your data correlates to another context. The aim is to show how your findings could work with others and how they feed into a macro context which meshes with data, theory and findings from other projects. Ask how your data works with other data types. How would your hypothesis play out in other contexts. How consistent would it be in other cases. How should it be tested against new data.

As an example, we have sorted cybercrime groupings on two dimensions, closed/open in terms of how porous their external boundaries are, and status driven/pecuniary in terms of their motive and business model. A Russian cybercrime grouping is closed and pecuniary within limits. It acts in the interests of the Russian state at times, seeking political legitimacy and in group status. Where might cybercrime groups yet to be brought into being sit and why? Would identity or language based groupings cluster at one end or another? Could it be applied to cases in the UNODC Sherloc database? What new hypotheses could be generated? What might we expect of Islamist or right wing terrorism, or the relationship between cyberwar and state conflict? One advantage is that you can take risks within the bounds of plausibility. The further work should be a genuine map ahead for you which takes you to new places, so think in terms of the possibilities it offers for new thinking and collaboration.

 

css.php

Report this page

To report inappropriate content on this page, please use the form below. Upon receiving your report, we will be in touch as per the Take Down Policy of the service.

Please note that personal data collected through this form is used and stored for the purposes of processing this report and communication with you.

If you are unable to report a concern about content via this form please contact the Service Owner.

Please enter an email address you wish to be contacted on. Please describe the unacceptable content in sufficient detail to allow us to locate it, and why you consider it to be unacceptable.
By submitting this report, you accept that it is accurate and that fraudulent or nuisance complaints may result in action by the University.

  Cancel