Instructions
Goal: The goal of this assignment is to research your topic, evaluate selected sources, and organize your sources.
Description:
During the Week 3 Assignment, Project Plan, you chose a topic and created your project plan. In the Week 3 Lesson, you read about location and access and in Week 4, you learned about organizing your digital information and storing that information responsibly. Now it is time to take the work you did in the Week 3 Assignment, Project Plan, and locate and evaluate sources (CO2 & 5) that that will lead to your Week Week 7 Assignment, Final Project.
Please follow these instructions:
- Download the Source Evaluation Worksheet template (in Word).
Complete Parts I and II in the worksheet. - Find a minimum of three (3) sources. One (1) source must be an academic source and from the APUS Trefrey Library and the other sources must be credible and appropriate for college research.
- Please include robust source summaries in your own words that explain the contents of the source and the relevance of the source to your topic.
Consider the following:
- Once you complete the Source Evaluation Worksheet, please upload the completed worksheet.
- See the COMM120 Week 5 Source Evaluation Rubric for grading guidelines.
Attachments
Source Evaluation Worksheet Template.docx(16.19 KB)
IVE ATTACHED WEEK THREES OUTLINE
Source Evaluation Worksheet
Part I: Topic
Describe the topic, concept, idea, or approach that is going to be the central idea of the Week 7 Field of Study Project. There is no minimum word count but please use several fully thought-out sentences to make your point.
Part II: Source Evaluation
Article Title: Add title
Article Author(s): Add author(s)
Retrieval Information (example website link): Add information
Source’s Publication Date: Add date
Publishing Information: Add publishing information
Source Summary:
Add short summary
Article Title: Add title
Article Author(s): Add author(s)
Retrieval Information (example website link): Add information
Source’s Publication Date: Add date
Publishing Information: Add publishing information
Source Summary:
Add short summary
Article Title: Add title
Article Author(s): Add author(s)
Retrieval Information (example website link): Add information
Source’s Publication Date: Add date
Publishing Information: Add publishing information
Source Summary:
Add short summary
Article Title: Add title
Article Author(s): Add author(s)
Retrieval Information (example website link): Add information
Source’s Publication Date: Add date
Publishing Information: Add publishing information
Source Summary:
Add short summary
Source Evaluation | 1
,
1
The Importance of Cybersecurity
Name
Institution
Date
Garlin Saintice
AMU
2024/01/16
2
The Importance of Cybersecurity
Internet safety matters a lot nowadays. It is not just about keeping data safe. It is also
shielding everyone, from regular people to businesses and governments, from online threats
(Perwej et al., 2021). These dangers grow as technology evolves. Folks who look for digital
weaknesses to take advantage of often create risks. To really get cybersecurity, you need to know
all its parts. It includes both tech stuff, like coding data and using firewalls, and people stuff, like
how internet scammers trick people. Hence, the significance of this study lies in the fact that it
enhances our own online safety and provides assistance to professionals working in industries
where the protection of digital assets is of utmost importance.
Communication Medium
You can show findings about internet safety in many formats. You can use things like
graphics, videos or interactive presentations to make hard tech ideas easier for everyone to
understand. Plus, showing reallife examples can make the information more practical. It shows
how internet safety actions actually work. Making a different, interesting presentation is key to
properly showing why internet safety matters.
Critical Thinking Questions
Thinking deeply about cybersecurity's many sides with these critical questions will help
in digging into the topic better than just a basic understanding would. Here are some things to
ponder:
a) How are cyber threats changing, and how can we all try to outsmart them?
b) What part do people play in making cybersecurity weak, and how can we reduce this
problem?
c) How does working with other countries help fight cyber threats across the globe?
3
d) Where does the line cross between using cybersecurity ethically and protecting personal
privacy?
e) How are new things like artificial intelligence affecting cybersecurity, for better or
worse?
Possible Subtopics
One can examine different angles of cybersecurity in these optional subtopics. They broaden the
essay, covering multiple aspects of cybersecurity.
a) Cybersecurity's Effect on National Security.
b) How Ethical Hacking Aids Cybersecurity.
c) Cybersecurity Breaches' effects on Financial Institutions.
d) Programs for Cybersecurity Awareness and Education.
e) Legal Rules and Standards in Cybersecurity.
Reflection
When doing research on this topic, one should focus on solid sources like academic
articles, wellknown cybersecurity journals, and trusted security group reports (Perwej, et al.,
2021). Interview transcripts with cybersecurity pros and experts are also great, giving reallife
views on the field's problems and progress (Fujs, 2019). It is key to make sure information is
believable, uptodate, dependable, precise, and linked to the topic. This leads to strong points
and helps the audience truly get why cybersecurity matters.
4
References
Fujs, D., Mihelič, A., & Vrhovec, S. L. (2019, August). The power of interpretation: Qualitative
methods in cybersecurity research. In Proceedings of the 14th International Conference
on Availability, Reliability and Security (pp. 110).
Perwej, Y., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A. K. (2021). A systematic literature
review on the cyber security. International Journal of scientific research and
management, 9(12), 669710.