Start by reading and following these instructions: Create your

Start by reading and following these instructions:

Create your Assignment submission and be sure to cite your sources, use APA style as required, and check your spelling.


Research (Weeks 2-3) To better understand the problem you wish to investigate for your capstone topic, you will need to review the research literature. Your project should include a review of the existing research on your topic and a discussion comparing this research to your project focus. The review should address what others have discovered or written about your topic and how the research helps you with investigating your capstone project.

Module 2 Assignment

Literature Review- Part 1: Annotated Bibliography

Due Week 2

(50 pts)

For this step of your capstone project, you will need to complete an annotated bibliography related to your APPROVED TOPIC: CYBER SECURITY. Please refer to this link to learn more about the purpose and contents of the annotated bibliography: 

Be sure to complete all three components of the annotated bibliography (summarize, assess, reflect). Your initial annotated bibliography should include 12-15 sources/references and should follow the APA writing style. References should be no older than five years, but classic texts that outline well-established theories may be included in three of the sources.

For those familiar with Excel, an Excel template is provided. You can use this template while researching each reference or use a text-based format as shown at the OWL at Purdue weblink:  Filling in a template as your research saves time when trying to find a specific reference during the writing phase.

Expert Solution Preview

Research plays a crucial role in medical education as it helps students understand the current state of knowledge and guides them in their own projects. As a medical professor, it is my responsibility to design assignments that challenge students to delve deeper into their chosen fields through research. In this assignment, students will be tasked with completing an annotated bibliography to identify relevant research on their approved topic of cyber security.

To complete the annotated bibliography assignment on cyber security, students will need to conduct extensive research to identify relevant sources. They should focus on sources that are no older than five years, but classic texts that outline well-established theories may be included in three of the sources. Students should use the three components of the annotated bibliography (summarize, assess, reflect) to ensure that they fully understand the content of each source and its relevance to their project. Additionally, students should follow the APA writing style and ensure that their sources are appropriately cited in their bibliography. By completing this assignment, students will gain a deeper understanding of cyber security while building their research skills.

#Start #reading #instructions #Create

Table of Contents

Calculate your order
Pages (275 words)
Standard price: $0.00

Latest Reviews

Impressed with the sample above? Wait there is more

Related Questions

ADEA or overtime

 Review the following lectures: Pay, Benefits, and Employment Outside of the United States Compensation Challenges for the HR Professional Contingent Workers Project The project assignment

Community assessment – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along

Two Day Post Discharge Callbacks


Cyber loafing For this week’s case, watch the above video about cyberloafing. Pick a side and examine the issue presented in the case using the Ethical

New questions

Don't Let Questions or Concerns Hold You Back - Make a Free Inquiry Now!