Review the Week 5 Annotated Bibliography Example

Review the Week 5 Annotated Bibliography Example

This week, you will develop a research question for your annotated bibliography:

  1. Choose a research topic.
  2. Explore your topic.
  3. Write your research question.

Choose a Research Topic

Choose a research topic related to your program or major. This topic will be used for all five weeks so choose one that interests you and for which two scholarly articles, one e-book , and two non-scholarly sources are available. Review the Possible Topics for Research handout if you need ideas. It is recommended that you review the GEN103 Week 1 Assignment example.

Provide a two to three sentence explanation of the research topic and how it is related to your major on the Week 1 Research Topic and Question worksheet.

Explore your Topic

On the Week 1 Assignment worksheet, fill in the KWHL chart to explore the research topic. Be sure to carefully follow the instructions on the worksheet. The 4 Easy Steps to Using the Ashford Library for Background Research is a helpful resource at this point.

Write Your Research Question

Write the first draft of your research question in the table at the bottom of the Week 1 Assignment worksheet. Your research question will help you focus your research by defining the information you are looking for as you research your topic.

Your research question must be:

  • Open-ended (should begin with “how,” “why” or “what”)
  • Clear
  • Concise
  • Detailed

 

Answer Preview………….

The selected research topic is cybersecurity. This is an essential topic for my major because most of its elements are affected by it. Furthermore, cybersecurity affects my major because most of its aspects are related to the use of data and other technological devices. You must have at least three distinct items listed in each column to get full credit for this portion of the assignment. What do I know? What do I want to know?How do I find out? What have I learned? I already know what cybersecurity is. Cybersecurity is defined as the art of protecting computer systems, electronic devices, and data against any form of damage or theft. Cybersecurity is a critical practice that promotes full data protection in various organizations (Graham, Olson & Howard, 2016). What is the relationship between cybersecurity and social media? The first tool that I will use include publications found in the college library. These materials may include books and repositories. What I have learned from the topic is that social media can be used as a vital tool in the promotion of cybersecurity by creating awareness on the impact of cybercrimes…………

APA 651 words

Share this paper
Open Whatsapp chat
1
Hello;
Can we help you?