UOTC Cyber Security Threats on Financial Sectors Paper

Anonymous

Question Description

Assignment:

I attached my in class research paper. Please review paper write about how the project. how it went well. What are the hitch-ups.Pros and Cons and difficulties.

Totally explain about the project each topics .

  1. Submit a 1500 word APA formatted paper on your group research experience; what did go well? what were your challenges? How you divided the work?
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Please review attached research document

Tutor Answer

TeacherMellwanner
School: UIUC

Find the attached.If you need any edits do not hestitate to ask.Thanks

Running head: PAPER REVIEW

1

Paper Review
Name
Institution
ITS-834
9/30/2019
Dr. William Souza

PAPER REVIEW

2
Paper Review

Research experiences
Members underwent various group experiences during the process of conducting the
research. The fear with most of the members was that they would mess up somehow during the
process. In the first place, everyone became skeptical about how some of the questions would get
answered. No one was certain where some of the answers would be fixed. In other words,
solutions had to be specified under different titles and categories. But after a brief consultation
among the researchers, the answers were correctly categorized under the right headings to avoid
mix-ups.
Another new experience was gained during the approach towards the members to see how
willing they were in writing a research paper about cybersecurity issues and attacks. It is
somehow challenging to step out of the comfort zone to go and ask new people on how to out in
writing a research paper. Choosing the relevant and the most suitable research is a challenging
part. Members had to look for the best research to cite from and consider the methodologies
used, whether the findings were valid and its impact on cybercrime issues, and whether ethical
considerations were put into account. In other words, the research had to look at cybersecurity
issues and see lessons learnt from the findings.
The research writing also took longer to accomplish than expected. Time was consumed
during a consultation and regular group meeting to ascertain the direction to go during the
process. Because of the time factor, administering the research was the most confusing part of it.
Mobilizing the members required leadership skills because one had to ascertain the time most
members were free to meet for discussions and conduct a follow up to see how far every member
h...

flag Report DMCA
Review

Anonymous
Return customer, been using sp for a good two years now.

Anonymous
Thanks as always for the good work!

Anonymous
Excellent job

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors