Database security and government breaches

Assignment Help Basic Computer Science
Reference no: EM13904126

PAPER #1: ABSTRACT, INTRODUCTION AND LITERATURE REVIEW 

This paper will consist of 20-points and is due in Week 3. You are to submit your Abstract, Introduction and Literature Review that typically range from 7 – 15 pages in length with no less than 10 peer reviewed references. This Word document is to be uploaded to this assignment as an attachment. Please title your paper by your last name and the word “Paper #2”. For example, my paper would be called “lastnamepaper#1.doc” with “.doc” being the MS Word file extension. 

IMPORTANT: The paper meet the APA 6th Edition format criteria established by the American Psychological Association. 

Abstract: 

An abstract is a condensed version of a longer piece of writing that highlights the major points covered, concisely describes the content and scope of the writing, and reviews the writing's contents in abbreviated form. In short, it should be a brief paragraph that summarizes what you want to research and why it is important usually between 100 and 200 words in length with pertinent references. 

Introduction: 

Why are you exploring this topic? In this section, it is appropriate to use a few sources that are not from peer reviewed journals. These may include mass media, television, newspaper, magazines, etc., information found on the Internet, books, etc. In addition, peer reviewed sources should also be used. This section is expected to be over 1 page in length however typically less than 3 pages with appropriate references. This section should grab the reader’s attention to the problem you want to look into – try and note why the information might be important. Would it inform policy? Might it lead to more safe conditions? Etc. 

Literature Review: 

This section contains only peer reviewed research that is related to your particular topic. I want to make it very clear, you should choose a topic that has many peer reviewed research articles for you to use. Do not choose something abstract where you cannot find anything. This is VERY important. Your instructor cannot help you if you get to week 4 and you can’t find any peer reviewed research. It is very important that you check this out in advance using the online library. You have to make sure of this or you will struggle with the class. Peer reviewed research articles are those that appear in criminal justice or public policy related journal articles that have passed a rigorous review process to validate the research contained in the article. The review process for these journals involves forwarding the research study to several researchers associated with the journal and these researchers review the study for reliability and validity, bias, proper research policies and procedures, ethical treatment of research subjects, ethical practices of the researchers, etc. If all of these and other criteria are met, the study can then be published in that journal. I encourage you to ask the library for help if you are still confused. The AMU library staff is very helpful in this area. Most journals on the inside cover describe the submission process for researchers. This is where if you see what is described above, the article has been peer reviewed. This process is what sets peer reviewed articles apart from those found in magazines, agency publications, books, etc. 

These journals can be found in the library. If trying to find these online, instead of the inside cover, you need to go to the journal's web site and review their submission process to determine if it meets the criteria. On occasion a government document may be included in this section if, and only if, it is the premier publication on the topic. 

This section is expected to be very thorough and substantial. While there is no page expectation, I do expect to see the entire major peer reviewed research related to your topic. This typically will be several pages and is to be in paragraph form and not in list form. I expect to see a smooth flow between articles and subtopics – much like you will find in published peer reviewed research articles. Do not turn in an annotated bibliography for this section…you need to talk about the literature in summary fashion and note why they are important and what their findings suggest. You should read over a couple of journal articles and note how they do their Introduction and literature review. This will help guide you as you set yours up! 

References: 

Incorporate all this sections references into one comprehensive list and should be in APA 6th Edition format. If you have a citation in the body of your work you must have the appropriate reference in the reference section. Also if you have a reference in your reference section, you must have a citation from that work somewhere in the body of your work. The citations and references must match up. 

You will be strictly held to the APA standards. Proper citations, in format and use as well as proper references must be implemented. 

Reference no: EM13904126

Questions Cloud

The aggregate segment of negligible money book : Rs. 75 paid for repairs to furniture had been entered in the aggregate segment of negligible money book, yet not entered in the suitable investigation section, the aggregate of which has been posted.
Technical specification indicating wireless technology : write a technical specification indicating which wireless technology you would use for specific scenarios
Design and implementation of an ecc public key system : Design and implementation of an ECC public key system to provide encryption/decryption and digital signature sign and verification in C or C ++ or Java.  You can use Diffie-Hellman key exchange protocol and the underlying field Fp or other key exchan..
How to make the mail secure : How to make the mail secure As introduced in the proposal instruction, a proposal should include the following parts (more details see: https://people.ok.ubc.ca/rlawrenc/teaching/writingProposal.html):
Database security and government breaches : Database Security and Government Breaches. In criminal justice or public policy related journal articles that have passed a rigorous review process to validate the research contained in the article.
Why you think that the cio is this type of manager : Using the IT Savvy four types of the CIO (page 146 IT Savvy below), choose a type for each of CIO or IT leaders for the following 8 cases attached (Attachments 1-8).Give example of why you think that the CIO is this type of manager.
Vital suspense account : Pass diary passages to redress the accompanying blunders expecting the presence of the vital Suspense Account:
Trade costs account : A measure of Rs. 2,000 withdrawn by the proprietor for his own utilization has been charged to Trade Costs Account.
A passage for the merchandise : A passage for the merchandise sold to Madhav for  Rs. 1,020 was presented for him as Rs. 1,200.Rs. 1,000 being the month to month aggregate of rebate permitted to clients was credited to markdown account in the record.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Make an argument for the state of the economy

Based on current data, make an argument for the state of the economy. Are we in a recessionary or inflationary gap? Neither? Are we in a deep recession? Are we in a large inflationary gap? If we are in neither, what direction (recession or inflation)..

  Successfully prevent identity theft

Select an article that details current methods that are used to successfully prevent identity theft. Discuss what security policies commerce should implement to prevent it from happening. Also, address the options users can take to protect th..

  What is the difference between monetary and fiscal policy

What is the difference between monetary and fiscal policy?

  What is the privacy of the data and information

What is the privacy of the data and information? Give detailed information of computer virus and how it works? How one can protect the computer from virus or explain the working of antivirus.

  Button subprocedure to store user-s name in cell

If you wish to take in and store user's name in cell A1 by having them type their name following prompt declaring "Give me your name, Earthling!" that code excerpt must you use within button subprocedure?

  Explain potential challenge of collaboration of firms

Author suggests ways to do this. Explain the potential challenge that this kind of collaboration might face and explain the way of dealing with it.

  Convert the floating point number to ieee

Convert the floating point number to IEEE Single Precision Floating-Point Representation and For the following 8-bit data, using 2's complement to conduct the following calculation

  Characterize a page fault rate using pure demand paging

Consider system which uses pure demand paging: When a process first start execution, how would you characterize a page fault rate?

  What will be the values of h1 and h2

The ystem is using a 2x1 multiplexer (0.6ns delay) and k-bit tag comparator (k/10ns delay).Let H1 denotes hit latency for 2-way set associative cache and H2 denotes hit latency for direct mapped cache. What will be the values of H1 and H2.

  Explain use of gross domestic product-measure business cycle

Explain the use of Gross Domestic Product (GDP) to measure business cycle. Explain the roles of government bodies which determine national fiscal policies.

  Write a mips program with the following specifcations

Write a MIPS program with the following specifcations: Reserve space in memory for a variable called UIN of size word. The initial value of UIN will be the sum of the digits in your UIN.

  Research the tcp protocol and choose one tcp

TCP is a reliable transport protocol. Research the TCP protocol and choose one TCP topic and write a tutorial, detailed instructions on the use of an IP related topic .  If the topic you have chosen has already been discussed in CSEC640 Module1, enha..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd