Create a coherent issue paper using given details

Assignment Help Computer Engineering
Reference no: EM132096918

Assignment 3: Cyber Issue Paper

Your final assignment is where you will weave the first two elements (the Cyber White Paper and Cyber Research Proposal) together, and incorporate your research analysis, to create a coherent issue paper that is 13-15 pages in length. While it is inappropriate (not to mention a violation of university policy) to cut-and-paste from past assignments in old courses into new ones, this research project is evolutionary and builds itself up from a research proposal to a completed product. For this reason, in this class it is permissible to paste the information (as appropriate and as it makes sense) from the first two assignments assigned in this course into your final assignment.

Format: Your research paper should include a title page, body, and reference page. Your paper should have a 1-inch border on all four sides, use Times New Roman-12 point font, be double spaced, and not have an extra space in-between paragraphs. (You may need to turn this off in MS word by going to "paragraph" and clicking "Don't add space between paragraphs of the same style). Since this is an INTL course you need to use the Turabian parenthetical citation style with a references page.

You are encouraged to refer to Belcher, Wendy Laura. 2009. "Editing Your Sentences" In Writing Your Journal Article in 12 Weeks. A Guide to Academic Publishing Success. Sage. This resource has an excellent step-by-step process for enhancing your writing.

Your research paper should include the following sections:

Introduction: This section should be written last and should pull from some of the elements of your research proposal. You will need to clearly provide an overview of the topic you are writing about, a concise synopsis of the issues, state your research question, and discuss why the situation is important to investigate. Writing the introduction last is helpful in ensuring that you've incorporated any changes that may have taken place over the course of your research. This section should be 1 page in length.

Literature Review: Your literature review section is a synthesis of the sources that you identified in your second assignment in addition to other sources that you have identified to support your research. This section should be 3-4 pages in length.

Methodology: This section will pull from, and expand upon, your research design section within your first assignment. Methodology sections are another standard element in research papers as they provide the reader with a clear understanding for how the research was carried out. In this section you should discuss your case study methodology and explain the validity of your approach. In your explanation be sure you explain how you chose the case to investigate, your data collection method, your data analysis (i.e. the questions you asked to help guide your research and thus answer your primary research question), and any potential data limitations and biases that pertain to this specific project. In your discussion of the studies limitations you should keep in mind that it is always best to end on a positive note, so be sure you discuss your plan to mitigate the limitations and biases, if any. This section should be 1-2 pages in length.

Analysis and Findings: This section and the conclusion discussed below are essentially the two newest components of your research project. Your analysis and findings section should provide a narrative of your research and the analytical arguments that you will make as a result of your findings. In this section you will discuss the different information processing errors that occurred within your chosen situation and explain how they lead to or are leading to errors in analysis and/or decision- making. Within this section you should provide the evidence that proves or disproves your research hypothesis. This section should be 5-6 pages in length.

Conclusion: This section will contain the concluding analytical arguments based on what the research has revealed. Here you will discuss some of the techniques and strategies that can be used to help mitigate the information processing errors and/or decision-making errors that occurred during the situation under investigation.

Like any conclusion, it should provide a synopsis of the project, the strategy, the results, and what the research adds to our body of knowledge. Within your conclusion you should also offer suggestions for avenues of future research for other scholars as all knowledge is evolutionary. This section should be 1-2 pages in length.

References: This section will contain all of the references that you have cited within your paper. They should be listed in Turabian References format and arranged alphabetically. Entitle this section as "References", each source notation should be single spaced with one space between each source.

At this level your references should fall within the 18-25 sources range and be made up primarily of peer-reviewed content.

Reference no: EM132096918

Questions Cloud

Include comments related to any ethical issues that arise : Explain the best solution for each. Include comments related to any ethical issues that arise.
Organization launches a program to recruit volunteers : When an organization launches a program to recruit volunteers,and that their assignment involves doing real work that is central to the program of the nonprofit
Explain the different types of communication methods : One of your employees is constantly late, leaving food and drinks at the work station, and you are forced to address the situation.
Discuss the different life stages of the life cycle : MOD005912 Lifecycle Development Assignment, Anglia Ruskin University, UK. Discuss the different life stages of the life cycle
Create a coherent issue paper using given details : Your final assignment is where you will weave the first two elements (the Cyber White Paper and Cyber Research Proposal) together, and incorporate.
Marketing activities have recently appeared in the news : Select three marketing topics from different companies whose marketing activities have recently appeared in the news.
Efficient way of estimating the test error : Suggest a more computationally efficient way of estimating the test error.
Perform analytical research to best guide their action : Utilizing an objective stance, you will take on the role as a consultant for a new small restaurant chain located in your home state.
The majority of which command large market shares : BEC has been around for more than 50 years and has many well-known brands, the majority of which command large market shares.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd