Literature Review Topic Cybersecurity's Importance to National Security

Anonymous
timer Asked: Jan 1st, 2018
account_balance_wallet $15

Question description

Literature Review Topic: Cybersecurity's Importance to National Security

Please provide a standard cover sheet with the Assignment Name, your name, date, and class.

Most research projects include a literature review to determine what knowledge exists on the subject under study and to develop the theoretical framework that will be used in the study. The literature review sets the context for the entire research project by explaining what others have found in researching the same or similar specific research questions. The literature review is written in a narrative format.

A literature review begins with an introductory paragraph in which the writer frames the research topic and its significance, and the puzzle that the researcher is addressing. To do that, the writer will summarize the major relevant arguments on the research subject, highlighting the main issues and how schools of thought might differ. If there are key terms to be defined, the writer should do that here. (1-2 pp)

The body of the literature review tells readers what others have found in their studies about your specific research question (the extent of existing knowledge on your specific research question), critiques what is right or wrong with these other studies, and discusses how the work is distinguishable from the research study you are proposing. Your review should organize material by theme or method or what makes sense for the project. This literature review should include a critical review of 4-6 appropriate articles, to include scholarly, peer-reviewed articles, material from government publications and websites, or other topic-appropriate source.

Please provide citations for the ideas of different authors. You may use parenthetical citations or footnotes. However, if you use parenthetical citations (Author Date) in the text, please use “References” format for the complete citations at the end of the assignment. (2-3 pp)

The conclusion should summarize the primary “sense of the literature”, encapsulating for the reader where the existing literature ends and your research will start as you seek to answer the question that still remains and add to the body of knowledge. (1 page)

Provide a List of References (or Bibliography if you used notes) in Turabian format. Provide complete citations for the articles and sources you used in your literature review.

Please look at the attached file.

Name NSEC500 – W4 Date Literature Review Assignment Please provide a standard cover sheet with the Assignment Name, your name, date, and class. Most research projects include a literature review to determine what knowledge exists on the subject under study and to develop the theoretical framework that will be used in the study. The literature review sets the context for the entire research project by explaining what others have found in researching the same or similar specific research questions. The literature review is written in a narrative format. A literature review begins with an introductory paragraph in which the writer frames the research topic and its significance, and the puzzle that the researcher is addressing. To do that, the writer will summarize the major relevant arguments on the research subject, highlighting the main issues and how schools of thought might differ. If there are key terms to be defined, the writer should do that here. (1-2 pp) The body of the literature review tells readers what others have found in their studies about your specific research question (the extent of existing knowledge on your specific research question), critiques what is right or wrong with these other studies, and discusses how the work is distinguishable from the research study you are proposing. Your review should organize material by theme or method or what makes sense for the project. This literature review should include a critical review of 5-8 appropriate articles, to include scholarly, peer-reviewed articles, material from government publications and websites, or other topic-appropriate source. Please provide citations for the ideas of different authors. You may use parenthetical citations or footnotes. However, if you use parenthetical citations (Author Date) in the text, please use “References” format for the complete citations at the end of the assignment. (2-3 pp) The conclusion should summarize the primary “sense of the literature”, encapsulating for the reader where the existing literature ends and your research will start as you seek to answer the question that still remains and add to the body of knowledge. (1 page) Name NSEC500 – W4 Date Provide a List of References (or Bibliography if you used notes) in Turabian format. Provide complete citations for the articles and sources you used in your literature review. Use the filename (no spaces): yourlastnameW4.doc to upload this file to the HW4 assignment. Use Times New Roman Font Black 12

Tutor Answer

ALWAYSORIGINAL
School: New York University

Here you go hun, please review and let me know of any revisions!

Running head: CYBER AND NATIONAL SECURITY

1

Cyber and National Security
Instructor
Class
Date
Name

CYBER AND NATIONAL SECURITY

2

It is just intelligent that when a circumstance emerges which undermines the proceeded
with the presence of the state, and consequently of the personal privileges of the whole populace,
the universal law allows specific proportionate measures to counter that danger (Finley, 2015).
This incorporates limitations on the flexibility of articulation, for example, a restriction on
unveiling troop developments, uncovering military encryption codes or actuating departure.
National security has, regardless, long been one of the favored certain devices by which
governments around the world, including law based ones, misguidedly smother the free stream
of information and considerations (Aron, 2014). The prediction models of cyber-attacks consist
of various essential values concerning national security and the infrastructure. Cybersecurity
measures enable national security to identify, bring value, utilize t...

flag Report DMCA
Review

Anonymous
Totally impressed with results!! :-)

Similar Questions
Hot Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors