Start by reading and following these instructions:
Create your Assignment submission and be sure to cite your sources, use APA style as required, and check your spelling.
Research (Weeks 2-3) To better understand the problem you wish to investigate for your capstone topic, you will need to review the research literature. Your project should include a review of the existing research on your topic and a discussion comparing this research to your project focus. The review should address what others have discovered or written about your topic and how the research helps you with investigating your capstone project.
Module 2 Assignment
Literature Review– Part 1: Annotated Bibliography
Due Week 2
For this step of your capstone project, you will need to complete an annotated bibliography related to your APPROVED TOPIC: CYBER SECURITY. Please refer to this link to learn more about the purpose and contents of the annotated bibliography:
Be sure to complete all three components of the annotated bibliography (summarize, assess, reflect). Your initial annotated bibliography should include 12-15 sources/references and should follow the APA writing style. References should be no older than five years, but classic texts that outline well-established theories may be included in three of the sources.
For those familiar with Excel, an Excel template is provided. You can use this template while researching each reference or use a text-based format as shown at the OWL at Purdue weblink: Filling in a template as your research saves time when trying to find a specific reference during the writing phase.
Expert Solution Preview
Research plays a crucial role in medical education as it helps students understand the current state of knowledge and guides them in their own projects. As a medical professor, it is my responsibility to design assignments that challenge students to delve deeper into their chosen fields through research. In this assignment, students will be tasked with completing an annotated bibliography to identify relevant research on their approved topic of cyber security.
To complete the annotated bibliography assignment on cyber security, students will need to conduct extensive research to identify relevant sources. They should focus on sources that are no older than five years, but classic texts that outline well-established theories may be included in three of the sources. Students should use the three components of the annotated bibliography (summarize, assess, reflect) to ensure that they fully understand the content of each source and its relevance to their project. Additionally, students should follow the APA writing style and ensure that their sources are appropriately cited in their bibliography. By completing this assignment, students will gain a deeper understanding of cyber security while building their research skills.
#Start #reading #instructions #Create