Describe the contents of the article in your own words

Assignment Help Management Information Sys
Reference no: EM131336738

Information Security Web

You are to find a recent article on information security on the web and describe the contents of the article in YOUR OWN WORDS. In your own words means that not even one sentence can be copied from the article. Not even phrases from the article can be used. If you want to quote it, it must be in quotes. However, the majority of the article must be in your own words and not quotes. Failure to write your own words will result in a very poor grade, perhaps a zero.

Your paper should be at least 2,500 words long. You MUST send me your paper as well as the original article as an attachment which is not compressed and can be read as a WORD document ONLY! NOTt a PDF. You should email the paper.

The original paper must not be a link but the actual paper in WORD (not a PDF). If you send a PDF, you will lose a minimum of 5 points. If you send only your paper and forget the article, it is another loss of 5 points!

You must choose a substantial paper. It must have something new to say or it can report on an actual case in industry, government or university. It cannot be from a textbook or tutorial. It must be something that was considered newsworthy. The article must have been published in the last 24 months. A substantial paper must be approximately seven pages of words. It should not be filled with diagrams, charts or pictures. The paper should be at least 3,000 words long. The 3,000 words is a required MINIMUM! To sum it up:

1. Article must be some new work not a tutorial or an excerpt from a textbook.
2. Article must be at least 3,000 words and about 7 pages long.
3. You must send me the article as a WORD document not a link not a PDF!
4. Your paper must be at least 2,500 words long.
5. It must be a word document.
6. It must follow the guidelines listed below. You must use the EXACT words for the headings. Do not use other words. The headings must stand out from the paper using a large font and bold.
7. It must be on time.

Failure to abide by these rules will result in loss of points. No excuses allowed.

I will accept the paper EARLY (before deadline) but will not accept it LATE (after deadline).

REMEMBER:

1. NO ZIP FILES
2. WORD ONLY!!!!! (NO PDF)
3. ORIGINAL ARTICLE IS READABLE & PRINTABLE

NOT A LINK, NOT A LINK!

Please note that the following is EXPECTED.

1. Use spell check - no spelling mistakes allowed. I will deduct points for spelling mistakes.

2. There must be an introduction at the beginning of the paper with the word introduction bolded and underlined followed by the introduction at the beginning of your paper.

INTRODUCTION (USE THESE WORDS WITH BOLD AND UNDERLINE)

This is the introduction .......

1. Following the introduction, you place a section that explains the paper.

EXPLANATION OF PAPER(USE THESE WORDS WITH BOLD & UNDERLINE)

This paper describes the ........

1. The next section states your opinion. What parts of the paper you agree with and which parts you disagree with. You need to explain your opinion thoroughly. A few sentences are insufficient.

MY OPINION(USE THESE WORDS WITH BOLD AND UNDERLINE)

I agree with ..... because of the following reasons. I do not agree with ... because of the following reasons.

1. There must be a summary right after the "MY OPINION" section.

SUMMARY(USE THESE WORDS WITH BOLD AND UNDERLINE)

1. There must be a bibliography at the end of the paper which must appear as follows:

BIBLIOGRAPHY(USE THESE WORDS WITH BOLD AND UNDERLINE)

Here you should put the bibliography

1. Thus, your paper should have the following sections in this order. The headings below should be in your paper so that it is easy to follow. The headings below should be in upper case, bolded and underlined.

If you substitute your own words like "ABSTRACT", "CONCLUSION" or "CITATION", I will deduct points.

INTRODUCTION

EXPLANATION OF PAPER

MY OPINION

SUMMARY

BIBLIOGRAPHY.

Reference no: EM131336738

Questions Cloud

Write a research about terrorism : You have a research about Terrorism.Write  8 to 10 pages about the Terrorism.it is about national security.
Identify the type of software or management tools : Conduct research using the Internet and identify the type of software or management tools that you would utilize to help with each of the major steps in developing the plan. Summarize the software/suite selected and identify its key capabilities, ..
Creating a culture of empowerment and accountability : In this final project, you will analyze the case study "Creating a Culture of Empowerment and Accountability at St. Martin de Porres High School" and develop an evaluative response paper.
Managing a diverse workforce : Based on your understanding of chapter 16 (Managing a Diverse Workforce), present arguments for or against workforce diversity and cite at least 3 outside sources to support your view points and conclusions..... (Must be at least 3 double-spaced p..
Describe the contents of the article in your own words : You are to find a recent article on information security on the web and describe the contents of the article in YOUR OWN WORDS. In your own words means that not even one sentence can be copied from the article.
Why banks normally include a cleanup provision : Why the annual financing cost of secured credit is frequently higher than that of unsecured credit.- Explain why banks normally include a "cleanup" provision in a line of credit agreement.
Describe the difference between a unit of input : 1. Describe the difference between a unit of input and the cost of an input, and identify the advantages and disadvantages of each for use in operational metrics
A line of credit and a revolving credit agreement : Explain the differences between a line of credit and a revolving credit agreement.- What are some of the disadvantages of relying too heavily on commercial paper as a source of short-term credit?
Discuss about the case given below : The research proposal is a composite of all of the previous assignments. An example of the specific format is attached. This is the first big step on road to writing your creative research project. This formal proposal will focus your research an..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Create a design for a secure email infrastructure

Create a design for a secure email infrastructure. You can choose any email system, server, client, and security appliance or software you know about or can find information about from any appropriate source

  Discuss the advantages and disadvantages of nesting the

discuss the advantages and disadvantages of nesting the information security role within the information technology it

  What are business benefits of implementing strong it asset

What are the business benefits of implementing strong IT asset management programs? In what ways have the companies discussed in the case benefited? Provide several examples.

  Understanding of union structure and governance

It has been argued that the hierarchical structure of the unions has hurt unions by limiting the participation of members in the union's governance. Others see the structure of unions as a natural reaction to the hierarchical structure of American..

  Prepare a hypothesis there is no relationship between

prepare a hypothesis there is no relationship between customer satisfaction amp loyaltyprepare a hypothesis using

  What kind of information makes products valuable

Do some research and find some other products (two or three) that have value over and above a comparable product because of such information? What kind of information makes products valuable? Consider both tangible (resale value) and intangible v..

  Web 20 cloud based hosting and in-house hostingwhat is web

web 2.0 cloud based hosting and in-house hostingwhat is web 2.0? how do organizations use web 2.0?explain the

  Technology and privacywith this thought in mind does the

technology and privacywith this thought in mind does the spread of surveillance technology threaten privacy?write on

  How clear was the intent of the discussion

Write a 1,400- to 1,750-word summary of your responses to the following after completing the collaborative Week 3 discussion associated with the "Planning a Playground and "Politics of Sociology" videos: How clear was the intent of the discussion

  Centralized and distributed models and pointing devices1

centralized and distributed models and pointing devices.1. computers can be connected using a centralized or

  What are component parts of the cpu

Provide at least two features that differentiate how random access memory (RAM), cache memory, flash memory (USB Flash Drive), optical storage (CD/DVD), and magnetic storage (hard drive) are used to store information. What are component parts of t..

  Write about cognitive computing

Write about given topics. Each topic 200 words or less- open source software, cloud computing and Cognitive computing

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd