Chat with us, powered by LiveChat Demonstrate the ability to create a final project that uses both research-based and personal content while using presentation software to communicate with an intended audience - Writingforyou

Demonstrate the ability to create a final project that uses both research-based and personal content while using presentation software to communicate with an intended audience

 

Instructions

Goal: Demonstrate the ability to create a final project that uses both research-based and personal content while using presentation software to communicate with an intended audience. 

Description:

During the first six-weeks you formulated a project plan, researched the content of the plan, and collected quality academic and non-academic sources. For the week 7 Final Project you will create a presentation (CO8) that builds upon the Week 3 Project Plan and the Week 5 Location and Access (Source Organization worksheet) that effectively communicates the knowledge you have gained during COMM120.

Please consider the following:

  • Presentation will include an introduction, body, conclusion, and properly formatted reference/work cited slide in the citation style of your degree program (APA, MLA, or Chicago).
  • Clear evidence that the topic was researched and expanded upon the week 2 Project Plan (CO2 & 5).
  • Presentation provides audience with information to increase their knowledge of the topic presented (CO1).
  • Presentation engages the audience by using elements such as images, graphs, and charts. Appropriate citations must be included.
  • Three (3) vetted credible sources. One (1) of the sources must be scholarly and from the library.
  • Appropriate length 7-9 slides.

If you have multimedia skills and want to add creative content to your presentation, please do! Try to add any of the following enhancements and as you do, think about how it will impact your presentation and improve communication with the intended audience.

  • Voice narration, closed captioning, script.
  • Appropriate background music (must be cited on reference page).
  • Creative use of slide animations and transitions.

After submitting your presentation, review your TurnItIn Originality Report. (Note: Review the individual flags, decide why that text is flagged, and make corrections as appropriate.). Please see the attached rubric for grading guidelines.

Note: The Week 7 Final Project is a presentation and be turned in as a PowerPoint, a Prezi, or a different type of presentation software. If you chose something other than PowerPoint, you have to do the following: 

  • Submit a link to the presentation such as for Prezi.
  • Ensure that the faculty can open the presentation. 
  • turn in a document with the presentation material so it can go through Turnitin. 
  • If you have a question, please contact your faculty member. 

1

The Importance of Cybersecurity

Name

Institution

Date

Garlin Saintice

AMU

2024/01/16

2

The Importance of Cybersecurity

Internet safety matters a lot nowadays. It is not just about keeping data safe. It is also

shielding everyone, from regular people to businesses and governments, from online threats

(Perwe­j et al., 2021). These dangers grow as technology evolves. Folks who look for digital

weaknesses to take advantage of often create risks. To really get cybersecurity, you need to know

all its parts. It includes both tech stuff, like coding data and using firewalls, and people stuff, like

how internet scammers trick people. Hence, the significance of this study lies in the fact that it

enhances our own online safety and provides assistance to professionals working in industries

where the protection of digital assets is of utmost importance.

Communication Medium

You can show findings about internet safety in many formats. You can use things like

graphics, videos or interactive presentations to make hard tech ideas easier for everyone to

understand. Plus, showing real­life examples can make the information more practical. It shows

how internet safety actions actually work. Making a different, interesting presentation is key to

properly showing why internet safety matters.

Critical Thinking Questions

Thinking deeply about cybersecurity's many sides with these critical questions will help

in digging into the topic better than just a basic understanding would. Here are some things to

ponder:

a) How are cyber threats changing, and how can we all try to outsmart them?

b) What part do people play in making cybersecurity weak, and how can we reduce this

problem?

c) How does working with other countries help fight cyber threats across the globe?

3

d) Where does the line cross between using cybersecurity ethically and protecting personal

privacy?

e) How are new things like artificial intelligence affecting cybersecurity, for better or

worse?

Possible Subtopics

One can examine different angles of cybersecurity in these optional subtopics. They broaden the

essay, covering multiple aspects of cybersecurity.

a) Cybersecurity's Effect on National Security.

b) How Ethical Hacking Aids Cybersecurity.

c) Cybersecurity Breaches' effects on Financial Institutions.

d) Programs for Cybersecurity Awareness and Education.

e) Legal Rules and Standards in Cybersecurity.

Reflection

When doing research on this topic, one should focus on solid sources like academic

articles, well­known cybersecurity journals, and trusted security group reports (Perwej, et al.,

2021). Interview transcripts with cybersecurity pros and experts are also great, giving real­life

views on the field's problems and progress (Fujs, 2019). It is key to make sure information is

believable, up­to­date, dependable, precise, and linked to the topic. This leads to strong points

and helps the audience truly get why cybersecurity matters.

4

References

Fujs, D., Mihelič, A., & Vrhovec, S. L. (2019, August). The power of interpretation: Qualitative

methods in cybersecurity research. In Proceedings of the 14th International Conference

on Availability, Reliability and Security (pp. 1­10).

Perwej, Y., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A. K. (2021). A systematic literature

review on the cyber security. International Journal of scientific research and

management, 9(12), 669­710.

,

1

The Importance of Cybersecurity

Name

Institution

Date

Garlin Saintice

AMU

2024/01/16

2

The Importance of Cybersecurity

Internet safety matters a lot nowadays. It is not just about keeping data safe. It is also

shielding everyone, from regular people to businesses and governments, from online threats

(Perwe­j et al., 2021). These dangers grow as technology evolves. Folks who look for digital

weaknesses to take advantage of often create risks. To really get cybersecurity, you need to know

all its parts. It includes both tech stuff, like coding data and using firewalls, and people stuff, like

how internet scammers trick people. Hence, the significance of this study lies in the fact that it

enhances our own online safety and provides assistance to professionals working in industries

where the protection of digital assets is of utmost importance.

Communication Medium

You can show findings about internet safety in many formats. You can use things like

graphics, videos or interactive presentations to make hard tech ideas easier for everyone to

understand. Plus, showing real­life examples can make the information more practical. It shows

how internet safety actions actually work. Making a different, interesting presentation is key to

properly showing why internet safety matters.

Critical Thinking Questions

Thinking deeply about cybersecurity's many sides with these critical questions will help

in digging into the topic better than just a basic understanding would. Here are some things to

ponder:

a) How are cyber threats changing, and how can we all try to outsmart them?

b) What part do people play in making cybersecurity weak, and how can we reduce this

problem?

c) How does working with other countries help fight cyber threats across the globe?

3

d) Where does the line cross between using cybersecurity ethically and protecting personal

privacy?

e) How are new things like artificial intelligence affecting cybersecurity, for better or

worse?

Possible Subtopics

One can examine different angles of cybersecurity in these optional subtopics. They broaden the

essay, covering multiple aspects of cybersecurity.

a) Cybersecurity's Effect on National Security.

b) How Ethical Hacking Aids Cybersecurity.

c) Cybersecurity Breaches' effects on Financial Institutions.

d) Programs for Cybersecurity Awareness and Education.

e) Legal Rules and Standards in Cybersecurity.

Reflection

When doing research on this topic, one should focus on solid sources like academic

articles, well­known cybersecurity journals, and trusted security group reports (Perwej, et al.,

2021). Interview transcripts with cybersecurity pros and experts are also great, giving real­life

views on the field's problems and progress (Fujs, 2019). It is key to make sure information is

believable, up­to­date, dependable, precise, and linked to the topic. This leads to strong points

and helps the audience truly get why cybersecurity matters.

4

References

Fujs, D., Mihelič, A., & Vrhovec, S. L. (2019, August). The power of interpretation: Qualitative

methods in cybersecurity research. In Proceedings of the 14th International Conference

on Availability, Reliability and Security (pp. 1­10).

Perwej, Y., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A. K. (2021). A systematic literature

review on the cyber security. International Journal of scientific research and

management, 9(12), 669­710.

,

EXEMPLARY

(4 pts) ACCOMPLISHED

(3.4 pts) DEVELOPING

(3 pts) BEGINNING

(2.6 pts) DID NOT ATTEMPT

(0 pts)

Use Information

Effectively* (40%)

(ILO-AL.A.2)

Communicates, organizes and synthesizes information from sources to fully achieve a specific purpose, with clarity and depth. Provides the audience with substantive information that increases their knowledge of the topic.

Communicates, organizes and synthesizes information from sources. Intended purpose is achieved. Provides the audience with information that increases their knowledge of the topic.

Communicates and organizes information from sources. The information is not yet synthesized, so the intended purpose is not fully achieved. Did not provide the audience with information that increases their knowledge of the topic.

Communicates information from sources. The information is fragmented and/or used inappropriately (misquoted, taken out of context, or incorrectly paraphrased, etc.), so the intended purpose is not achieved. Did not provide the audience with information that increases their knowledge of the topic.

Student did not attempt.

Presentation Organization

(20%)

The organization of the presentation includes an introduction, body, conclusion, and properly formatted reference/works cited page.

The organization of the presentation includes an introduction, body, conclusion, and reference/works cited page.

The organization of the presentation includes an introduction, body, and conclusion, but no reference/works cited page

The presentation lacks a cohesive organization or a reference/works cited page.

Student did not attempt.

Graphics and Appearance

(20%)

Effective use of bullets and spacing on all slides. Pictures, in addition to the slide background are used strategically on slides. A professional-looking slide background is used.

Effective use of bullets and spacing on most slides. Pictures used on some slides. A professional-looking slide background is used.

Effective use of bullets and spacing on is inconsistent on the slides or pictures are not used appropriately or a professional-looking slide background

Effective use of bullets and spacing on is inconsistent on the slides and pictures are not used appropriately and a professional-looking slide background is not used.

Student did not attempt.

Sources and Evidence*

(10%)

Demonstrates skillful use of high- quality, credible, relevant sources to develop ideas that are appropriate for the discipline and genre of the writing

Demonstrates consistent use of credible, relevant sources to support ideas that are situated within the discipline and genre of the writing.

Demonstrates an attempt to use credible and/or relevant sources to support ideas that are appropriate for the discipline and genre of the writing.

Demonstrates an attempt to use sources to support ideas in the writing.

Student did not attempt.

Writing Quality* (10%)

Uses graceful language that skillfully communicates meaning to readers with clarity and fluency, and is virtually error- free.

Uses straightforward language that generally conveys meaning to readers. The language in the portfolio has few errors.

Uses language that generally conveys meaning to readers with clarity, although writing may include some errors.

Uses language that sometimes impedes meaning because of errors in usage.

Student did not attempt.

*Portions of this rubric come from the AAC&U Value Rubrics. Retrieved from https://www.aacu.org/value-rubrics

 The Sources and Evidence and Writing Quality criteria come from the AAC&U Written Communication Value Rubric

 The Use Information Effectively criteria comes from the Information Literacy Value Rubric.