logo

Satisfactory APA Style Annotations | Assignment

11 Pages3495 Words470 Views
   

Added on  2020-04-21

Satisfactory APA Style Annotations | Assignment

   Added on 2020-04-21

ShareRelated Documents
Name:ID:Assignment 1 - Annotated Bibliography (Part A) &Term Paper Outline (Part B)Due Date:Fri., Oct. 27, 2017 @ 11:59 p.m. PDTValue: 75marksWeight: 15% of final course gradeNote 1:Lateassignmentsarenotaccepted.Ifyour assignmentislate or you don’t submit anything,youwillreceive amarkof zero. Please see the syllabus for more information.Note 2: Consult the list of term paper topics (from Week 1) for possible topics. This assignment consists of two parts: Part A is the Annotated Bibliography and Part B is the Term Paper Outline.Format:See sample and template, belowObjectives1.To organize, summarize, and synthesize the relevant literature on both sides of the issue you are investigating in your term paper2.To provide evidence that you understand how the literature you’ve gathered will fit into the arguments in your term paper3.To demonstrate your ability to correctly cite resources in APA style4.To demonstrate your ability to write satisfactory APA style annotations5.To organize the ideas in the position statement and prospectus you developed in your discussion exercises into a formal, working outline for your term paper(see Rozakis, 2007, p. 98)6.To organize the most importantpro and conarguments in relation to your topic and your position in your term paper7.To practice following detailed instructions and meeting deadlines, as part of employment-based educationGeneral Instructions1.Complete this assignment using the following specific instructions.Use blue type to Page 1 of 11
Satisfactory APA Style Annotations | Assignment_1
differentiate your work from the text of the assignment.2.Type your name and ID number is the spaces on page 1, above.3.Type your answers in this document using the templates below.4.Where appropriate in the annotations and outline, use the first personperspective (i.e., “I argue”), not the third person (i.e., “The writer argues”) when discussing your own viewpoint.Note: See the following reading for more information about using the first-person perspectiveeffectively.Duke University, Writing Studio. (n.d.). Because I said so: Effective use of the first-person perspective and the personal voice in academic writing. Retrieved from https://twp.duke.edu/uploads/assets/first_person.pdf5.Submit your assignmentbefore the due date. Use the Assignment Tool on the course website to submit your work. TheToolisintheAssignment1 folderonthecoursewebsite.Page 2 of 11
Satisfactory APA Style Annotations | Assignment_2
Part A - Annotated BibliographyInstructionsInstructionsStep 1 – Write your revised thesis statement. See the specific instructions in the template, below.Step 2 – Cite sources on the pro side. Provide correctly formatted APA citations for three articles, books, websites, videos, etc. on the pro side of the issue debate. You may use resources you cited in your discussion exercises.Note:At least one of your resources on each side of the debate must be an academic journal article.Note: Consult the Concise Rules of APA Style as necessary. The blue text below provides a template for journal articles with DOIs.Note: Make sure that you incorporate feedback from previous discussion exercises into this assignment. That means you should correct any mistakes that the course professor pointed out in your previous citations (e.g., capitalization, italicization, spelling, formatting, etc.).Step 3 - Cite sources on the con side.Provide correctly formatted APA citations for three articles, books, websites, videos, etc. on the con side of the issue debate. You may use resources you cited in your discussion exercises, or you may use different, relevant resources.Note: The same requirements for citing pro resources apply to citing con resources (see Step 4, above).Step 4 - Write the annotations. Under each citation (i.e., pro and con) and following APA rules, type your annotations. For examples, see the required resources listed in the Course Schedule and the following resource.Purdue Online Writing Lab. (2016). Annotated bibliography samples. Retrieved fromhttps://owl.english.purdue.edu/owl/resource/614/03/Page 3 of 11
Satisfactory APA Style Annotations | Assignment_3
Part A - Annotated BibliographyTemplate to UseName: Dhillon Dilpreet KaurID: 300145468Topic(s): Information securityNote: Revised Position StatementThe process of information security is used to define the various processes and strategies that can be used for the management of processes, policies and tools. These are then can be used for the preventionand detection of threats or vulnerabilities in the sectors of digital and analog processes. Basically, the useof the information security is done to develop business processes for protection of the various information assets of a company or organization. The following thesis discusses about the various pros and cons of the information security aspects. The pros present in the use of the information security technologies is better access and better communication. However, the main cons as discussed in this thesis are the present of various vulnerabilities or threats that can arrive due to it. Pro Resources& AnnotationsThis section of the thesis discusses about the pros of information security that can be used for the normal business operations of various companies or organizations. Ahmad, A., Maynard, S. B., & Park, S. (2014). Information security strategies: towards an organizational multi-strategy perspective.Journal of Intelligent Manufacturing,25(2), 357-370.The first advantage to the use of information security is the prevention of various attacks. These information technologies provide a prediction of the applied vulnerability that can be used for targeting the business involved. The use of big data or prediction algorithm can thus be used to get insights into these types of actions. The use of information security protocols are mainly used to prohibit unethical access by addressing the authorization and the authentication needs of asystem. This can also be used to reduce the leakage of information from the system. This makes arequirement for businesses to adapt to the vulnerabilities and essentially mitigate them by the application of security patches in the existing physical architecture. Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-centered information security: Managing a strategic balance between prevention and response.Information & Management,51(1), 138-151.The next advantage of information security technologies is the application for surveillancepurposes. These can be highly used for the monitoring the presence of any detected threats like malwares, worms or viruses to cause disaster in a system. This will then be used for the mitigation purposes and will help the system get secure. This method of spreading the awareness of surveillance related purposes helps a company or organization to better cope with the issues.Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the cloud.International Journal of Network Security & Its Applications,6(1), 25.Page 4 of 11
Satisfactory APA Style Annotations | Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
N2300 Nursing Article Summary | Assignment
|3
|800
|25

Information Retrieval Paper: Part 3
|5
|1489
|316

Information Retrieval Paper - Part 1 for N3345 Transition to Professional Nursing
|14
|3814
|348

Information Retrieval Paper - Part 1
|10
|2893
|292

Continuous Quality Monitoring and Accreditation - Week 4 Assignment
|31
|764
|284

Research Essay Assignment: Tips and Guidelines
|2
|793
|460