Satisfactory APA Style Annotations | Assignment

Added on - Apr 2020

Trusted by 2+ million users,
1000+ happy students everyday
Showing pages 1 to 4 of 11 pages
Name:ID:Assignment 1 - Annotated Bibliography (Part A) &Term Paper Outline (Part B)Due Date:Fri., Oct. 27, 2017 @ 11:59 p.m. PDTValue:75marksWeight:15% of final course gradeNote 1:Lateassignmentsarenotaccepted.Ifyourassignmentislate or you don’t submitanything,youwillreceive amarkof zero. Please see the syllabus for more information.Note 2: Consult the list of term paper topics (from Week 1) for possible topics.This assignment consists of two parts:Part Ais the Annotated Bibliography andPart Bis theTerm Paper Outline.Format:See sample and template, belowObjectives1.Toorganize,summarize, andsynthesizethe relevant literature onbothsides of the issueyou are investigating in your term paper2.To provideevidencethat you understand how the literature you’ve gathered will fit intothe arguments in your term paper3.To demonstrate your ability to correctly cite resources in APA style4.To demonstrate your ability to write satisfactory APA style annotations5.To organize the ideas in the position statement and prospectus you developed in yourdiscussion exercisesinto a formal,working outlinefor your term paper(see Rozakis, 2007,p. 98)6.To organize the most importantproandconarguments in relation to your topic and yourposition in your term paper7.To practice following detailed instructions and meeting deadlines, as part of employment-based educationGeneral Instructions1.Complete this assignment using the following specific instructions.Use blue type toPage1of11
differentiate your work from the text of the assignment.2.Type your name and ID number is the spaces on page 1, above.3.Type your answersin this documentusing the templates below.4.Where appropriate in the annotations and outline, use thefirst personperspective(i.e., “Iargue”), not the third person (i.e., “The writer argues”) when discussing your own viewpoint.Note: See the following reading for more information about using the first-person perspectiveeffectively.Duke University, Writing Studio. (n.d.).Because I said so: Effective use of the first-personperspective and the personal voice in academic writing.Retrieved from your assignmentbeforethe due date. Use theAssignment Toolon the course websiteto submit your work. TheToolisintheAssignment1folderonthecoursewebsite.Page2of11
Part A - Annotated BibliographyInstructionsInstructionsStep 1 – Write your revised thesis statement.See the specific instructions in thetemplate, below.Step 2 – Cite sources on theproside.Provide correctly formatted APA citationsforthreearticles, books, websites, videos, etc. on theproside of the issue debate. Youmay use resources you cited inyour discussion exercises.Note:At leastoneof your resources oneachside of the debate must be anacademic journalarticle.Note: Consult theConcise Rules of APA Styleas necessary. Thebluetext below provides atemplate for journal articles with DOIs.Note:Make sure that you incorporate feedback from previous discussion exercises into thisassignment.That means you should correct any mistakes that the course professor pointed out inyour previous citations (e.g., capitalization, italicization, spelling, formatting, etc.).Step 3 - Cite sources on theconside.Provide correctly formatted APA citations forthreearticles, books, websites, videos, etc. on theconside of the issue debate. You mayuse resources you cited inyour discussion exercises, or you may use different, relevantresources.Note:The same requirements for citing pro resources apply to citing con resources (seeStep 4,above).Step 4 - Write the annotations.Undereachcitation (i.e., proandcon) and followingAPA rules, type yourannotations. For examples, see the required resources listed in theCourse Scheduleand the following resource.Purdue Online Writing Lab. (2016).Annotated bibliography samples.Retrievedfrom
Part A - Annotated BibliographyTemplate to UseName:Dhillon Dilpreet KaurID:300145468Topic(s): Information securityNote:Revised Position StatementThe process of information security is used to define the various processes and strategies that can beused for the management of processes, policies and tools. These are then can be used for the preventionand detection of threats or vulnerabilities in the sectors of digital and analog processes. Basically, the useof the information security is done to develop business processes for protection of the variousinformation assets of a company or organization. The following thesis discusses about the various prosand cons of the information security aspects. The pros present in the use of the information securitytechnologies is better access and better communication. However, the main cons as discussed in thisthesis are the present of various vulnerabilities or threats that can arrive due to it.Pro Resources& AnnotationsThis section of the thesis discusses about the pros of information security that can be usedfor the normal business operations of various companies or organizations.Ahmad, A., Maynard, S. B., & Park, S. (2014). Information security strategies: towards an organizationalmulti-strategy perspective.Journal of Intelligent Manufacturing,25(2), 357-370.The first advantage to the use of information security is the prevention of various attacks.These information technologies provide a prediction of the applied vulnerability that can be usedfor targeting the business involved. The use of big data or prediction algorithm can thus be usedto get insights into these types of actions. The use of information security protocols are mainlyused to prohibit unethical access by addressing the authorization and the authentication needs of asystem. This can also be used to reduce the leakage of information from the system. This makes arequirement for businesses to adapt to the vulnerabilities and essentially mitigate them by theapplication of security patches in the existing physical architecture.Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-centered information security: Managing astrategic balance between prevention and response.Information & Management,51(1), 138-151.The next advantage of information security technologies is the application for surveillancepurposes. These can be highly used for the monitoring the presence of any detected threats likemalwares, worms or viruses to cause disaster in a system. This will then be used for themitigation purposes and will help the system get secure. This method of spreading the awarenessof surveillance related purposes helps a company or organization to better cope with the issues.Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the cloud.InternationalJournal of Network Security & Its Applications,6(1), 25.Page4of11
Desklib Logo
You are reading a preview
Upload your documents to download or

Become a Desklib member to get access