Chat with us, powered by LiveChat Instructions Goal: The goal of this assignment is to research your topic, evaluate selected sources, and organize your sources. Description: During the Week 3 Assignment, Proj - Writingforyou

Instructions Goal: The goal of this assignment is to research your topic, evaluate selected sources, and organize your sources. Description:  During the Week 3 Assignment, Proj

 

Instructions

Goal: The goal of this assignment is to research your topic, evaluate selected sources, and organize your sources.

Description: 
During the Week 3 Assignment, Project Plan, you chose a topic and created your project plan. In the Week 3 Lesson, you read about location and access and in Week 4, you learned about organizing your digital information and storing that information responsibly. Now it is time to take the work you did in the Week 3 Assignment, Project Plan, and locate and evaluate sources  (CO2 & 5) that that will lead to your Week Week 7 Assignment, Final Project. 

Please follow these instructions: 

  • Download the Source Evaluation Worksheet template (in Word).
    Complete Parts I and II in the worksheet.
  • Find a minimum of three (3) sources. One (1) source must be an academic source and from the APUS Trefrey Library and the other sources must be credible and appropriate for college research.
  • Please include robust source summaries in your own words that explain the contents of the source and the relevance of the source to your topic.

Consider the following: 

  • Once you complete the Source Evaluation Worksheet, please upload the completed worksheet.
  • See the COMM120 Week 5 Source Evaluation Rubric for grading guidelines.

Attachments

Source Evaluation Worksheet Template.docx(16.19 KB) 

IVE ATTACHED WEEK THREES OUTLINE

Source Evaluation Worksheet

Part I: Topic

Describe the topic, concept, idea, or approach that is going to be the central idea of the Week 7 Field of Study Project. There is no minimum word count but please use several fully thought-out sentences to make your point.

Part II: Source Evaluation

Article Title: Add title

Article Author(s): Add author(s)

Retrieval Information (example website link): Add information

Source’s Publication Date: Add date

Publishing Information: Add publishing information

Source Summary:

Add short summary

Article Title: Add title

Article Author(s): Add author(s)

Retrieval Information (example website link): Add information

Source’s Publication Date: Add date

Publishing Information: Add publishing information

Source Summary:

Add short summary

Article Title: Add title

Article Author(s): Add author(s)

Retrieval Information (example website link): Add information

Source’s Publication Date: Add date

Publishing Information: Add publishing information

Source Summary:

Add short summary

Article Title: Add title

Article Author(s): Add author(s)

Retrieval Information (example website link): Add information

Source’s Publication Date: Add date

Publishing Information: Add publishing information

Source Summary:

Add short summary

Source Evaluation | 1

,

1

The Importance of Cybersecurity

Name

Institution

Date

Garlin Saintice

AMU

2024/01/16

2

The Importance of Cybersecurity

Internet safety matters a lot nowadays. It is not just about keeping data safe. It is also

shielding everyone, from regular people to businesses and governments, from online threats

(Perwe­j et al., 2021). These dangers grow as technology evolves. Folks who look for digital

weaknesses to take advantage of often create risks. To really get cybersecurity, you need to know

all its parts. It includes both tech stuff, like coding data and using firewalls, and people stuff, like

how internet scammers trick people. Hence, the significance of this study lies in the fact that it

enhances our own online safety and provides assistance to professionals working in industries

where the protection of digital assets is of utmost importance.

Communication Medium

You can show findings about internet safety in many formats. You can use things like

graphics, videos or interactive presentations to make hard tech ideas easier for everyone to

understand. Plus, showing real­life examples can make the information more practical. It shows

how internet safety actions actually work. Making a different, interesting presentation is key to

properly showing why internet safety matters.

Critical Thinking Questions

Thinking deeply about cybersecurity's many sides with these critical questions will help

in digging into the topic better than just a basic understanding would. Here are some things to

ponder:

a) How are cyber threats changing, and how can we all try to outsmart them?

b) What part do people play in making cybersecurity weak, and how can we reduce this

problem?

c) How does working with other countries help fight cyber threats across the globe?

3

d) Where does the line cross between using cybersecurity ethically and protecting personal

privacy?

e) How are new things like artificial intelligence affecting cybersecurity, for better or

worse?

Possible Subtopics

One can examine different angles of cybersecurity in these optional subtopics. They broaden the

essay, covering multiple aspects of cybersecurity.

a) Cybersecurity's Effect on National Security.

b) How Ethical Hacking Aids Cybersecurity.

c) Cybersecurity Breaches' effects on Financial Institutions.

d) Programs for Cybersecurity Awareness and Education.

e) Legal Rules and Standards in Cybersecurity.

Reflection

When doing research on this topic, one should focus on solid sources like academic

articles, well­known cybersecurity journals, and trusted security group reports (Perwej, et al.,

2021). Interview transcripts with cybersecurity pros and experts are also great, giving real­life

views on the field's problems and progress (Fujs, 2019). It is key to make sure information is

believable, up­to­date, dependable, precise, and linked to the topic. This leads to strong points

and helps the audience truly get why cybersecurity matters.

4

References

Fujs, D., Mihelič, A., & Vrhovec, S. L. (2019, August). The power of interpretation: Qualitative

methods in cybersecurity research. In Proceedings of the 14th International Conference

on Availability, Reliability and Security (pp. 1­10).

Perwej, Y., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A. K. (2021). A systematic literature

review on the cyber security. International Journal of scientific research and

management, 9(12), 669­710.