Database security and government breaches

Assignment Help Basic Computer Science
Reference no: EM13904126

PAPER #1: ABSTRACT, INTRODUCTION AND LITERATURE REVIEW 

This paper will consist of 20-points and is due in Week 3. You are to submit your Abstract, Introduction and Literature Review that typically range from 7 – 15 pages in length with no less than 10 peer reviewed references. This Word document is to be uploaded to this assignment as an attachment. Please title your paper by your last name and the word “Paper #2”. For example, my paper would be called “lastnamepaper#1.doc” with “.doc” being the MS Word file extension. 

IMPORTANT: The paper meet the APA 6th Edition format criteria established by the American Psychological Association. 

Abstract: 

An abstract is a condensed version of a longer piece of writing that highlights the major points covered, concisely describes the content and scope of the writing, and reviews the writing's contents in abbreviated form. In short, it should be a brief paragraph that summarizes what you want to research and why it is important usually between 100 and 200 words in length with pertinent references. 

Introduction: 

Why are you exploring this topic? In this section, it is appropriate to use a few sources that are not from peer reviewed journals. These may include mass media, television, newspaper, magazines, etc., information found on the Internet, books, etc. In addition, peer reviewed sources should also be used. This section is expected to be over 1 page in length however typically less than 3 pages with appropriate references. This section should grab the reader’s attention to the problem you want to look into – try and note why the information might be important. Would it inform policy? Might it lead to more safe conditions? Etc. 

Literature Review: 

This section contains only peer reviewed research that is related to your particular topic. I want to make it very clear, you should choose a topic that has many peer reviewed research articles for you to use. Do not choose something abstract where you cannot find anything. This is VERY important. Your instructor cannot help you if you get to week 4 and you can’t find any peer reviewed research. It is very important that you check this out in advance using the online library. You have to make sure of this or you will struggle with the class. Peer reviewed research articles are those that appear in criminal justice or public policy related journal articles that have passed a rigorous review process to validate the research contained in the article. The review process for these journals involves forwarding the research study to several researchers associated with the journal and these researchers review the study for reliability and validity, bias, proper research policies and procedures, ethical treatment of research subjects, ethical practices of the researchers, etc. If all of these and other criteria are met, the study can then be published in that journal. I encourage you to ask the library for help if you are still confused. The AMU library staff is very helpful in this area. Most journals on the inside cover describe the submission process for researchers. This is where if you see what is described above, the article has been peer reviewed. This process is what sets peer reviewed articles apart from those found in magazines, agency publications, books, etc. 

These journals can be found in the library. If trying to find these online, instead of the inside cover, you need to go to the journal's web site and review their submission process to determine if it meets the criteria. On occasion a government document may be included in this section if, and only if, it is the premier publication on the topic. 

This section is expected to be very thorough and substantial. While there is no page expectation, I do expect to see the entire major peer reviewed research related to your topic. This typically will be several pages and is to be in paragraph form and not in list form. I expect to see a smooth flow between articles and subtopics – much like you will find in published peer reviewed research articles. Do not turn in an annotated bibliography for this section…you need to talk about the literature in summary fashion and note why they are important and what their findings suggest. You should read over a couple of journal articles and note how they do their Introduction and literature review. This will help guide you as you set yours up! 

References: 

Incorporate all this sections references into one comprehensive list and should be in APA 6th Edition format. If you have a citation in the body of your work you must have the appropriate reference in the reference section. Also if you have a reference in your reference section, you must have a citation from that work somewhere in the body of your work. The citations and references must match up. 

You will be strictly held to the APA standards. Proper citations, in format and use as well as proper references must be implemented. 

Reference no: EM13904126

Questions Cloud

The aggregate segment of negligible money book : Rs. 75 paid for repairs to furniture had been entered in the aggregate segment of negligible money book, yet not entered in the suitable investigation section, the aggregate of which has been posted.
Technical specification indicating wireless technology : write a technical specification indicating which wireless technology you would use for specific scenarios
Design and implementation of an ecc public key system : Design and implementation of an ECC public key system to provide encryption/decryption and digital signature sign and verification in C or C ++ or Java.  You can use Diffie-Hellman key exchange protocol and the underlying field Fp or other key exchan..
How to make the mail secure : How to make the mail secure As introduced in the proposal instruction, a proposal should include the following parts (more details see: https://people.ok.ubc.ca/rlawrenc/teaching/writingProposal.html):
Database security and government breaches : Database Security and Government Breaches. In criminal justice or public policy related journal articles that have passed a rigorous review process to validate the research contained in the article.
Why you think that the cio is this type of manager : Using the IT Savvy four types of the CIO (page 146 IT Savvy below), choose a type for each of CIO or IT leaders for the following 8 cases attached (Attachments 1-8).Give example of why you think that the CIO is this type of manager.
Vital suspense account : Pass diary passages to redress the accompanying blunders expecting the presence of the vital Suspense Account:
Trade costs account : A measure of Rs. 2,000 withdrawn by the proprietor for his own utilization has been charged to Trade Costs Account.
A passage for the merchandise : A passage for the merchandise sold to Madhav for  Rs. 1,020 was presented for him as Rs. 1,200.Rs. 1,000 being the month to month aggregate of rebate permitted to clients was credited to markdown account in the record.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine present worth-future worth of soldering machine

The initial cost is in week 0 and the payments are in years 1-4. Determine the present worth, future worth, and annual worth for.

  Design a simple network monitoring system

In this assignment, you are going to design a simple network monitoring system that is suitable for a small business.

  Write a sql query to display customer id

Use joining technique (WHERE commands is preferred[1]) to write a SQL query to display customer ID, customer name, and customer address for all the customers who are doing business with PVFC in the territory of Southwest.

  Define a job scheduling strategy that will meet business

Define a job scheduling strategy that will meet business requirement of reporting availability by 6am CST for the following cubes? Show the job scheduling dependencies in a pictorial form so that it is easy to understand.

  Find all the three-digit armstrong numbers

• The output of your program should be four numbers. They won't be negative numbers. • When you add the four numbers, they add up to 45. • If you add 2 to the first number, you get the same answer as if you had subtracted 2 from the second number. • ..

  Write difference between logical and physical modeling

What is the difference between logical and physical modeling? Give three reasons why logical models are superior for structuring business requirements.

  Research and discuss applications in a specific device

Discuss further thoughts on the importance of path finding to devices like GPSs. Conduct some research and discuss applications in a specific device

  Draw the circuit for a 2-input xnor gate

Draw the circuit for a 2-input XNOR gate using at most two tri-state elements (tri-state buffer or tri-state inverter) and one inverter.

  Use huffman coding for compression-decompression.

Use Huffman coding for compression/decompression. When computing the Huffman tree, do not compute the code for any character that does not exist in the input. Do not insert these characters into the min-heap.

  Benefits-negative effects brought by workplace automation

Write down at least three benefits and three negative effects brought about by workplace automation.

  Examine the major benefits for an organization to use ssds

Examine the major benefits for an organization to use SSDs. Analyze the major disadvantages and possible hazards that an organization should consider before adopting SSDs.

  Is the java source filename extension

is the Java source filename extension? What is the Java bytecode filename extension?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd