Start by reading and following these instructions:
Create your Assignment submission and be sure to cite your sources, use APA style as required, check your spelling.
Assignment:
Research (Weeks 2-3)In order to better understand the problem that you wish to investigate for your capstone topic, you will need to conduct a review of the research literature. Your project should include a review of the existing research on your topic and a discussion comparing this research to your project focus. The review should address what others have discovered or written about your topic and how the research helps you with investigating your capstone project.
Module 2 Assignment
Literature Review- Part 1: Annotated Bibliography
Due Week 2
(50 pts)
For this step of your capstone project, you will need to complete an annotated bibliography related to your APPROVED TOPIC: CYBER SECURITY. Please refer to this link to learn more about the purpose and contents of the annotated bibliography: OWL at Purdue
Be sure to complete all three components of the annotated bibliography (summarize, assess, reflect). Your initial annotated bibliography should include 12-15 sources/references and should follow the APA writing style. References should be no older than five years, but classic texts that outline well-established theories may be included in three of the sources.
For those familiar with Excel, an Excel template is provided. You can use this template while researching each reference or use a text-based format as shown at the OWL at Purdue weblink (above). Filling in a template as you research saves time when trying to find a specific reference during the writing phase.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read more
Recent Comments