Emerging threats and counter measures

User Generated

puhgxv

Writing

Description

Mid-term research paper - Annotated Bibliography - Defense-in-Depth Submit Here Depth

This assignment will be one of several throughout your PhD program that we use to help you prepare for the dissertation process. One of the core competencies necessary to succeed in a doctoral program is the ability to identify other research that pertains to your own. This means you'll have to identify similar research, read the papers, and assimilate prior work into your own research. An annotated bibliography helps you develop and hone these research skills.

This assignment is listed on the syllabus as "Mid-term research paper" and is worth 10% of your grade. Your paper will be an annotated bibliography, specifically focusing on the "Depth" topic (i.e. Defense in Depth) in the context of protecting National Infrastructure.

You paper must be in correct APA format, use correct grammar, and will need to include at least seven (7) resources, ALL of which must:

1) Be current. Published within the last few years.

2) Be peer-reviewed.

3) Relate directly to Defense in depth in the context of protecting National Infrastructure.

Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical. Give me enough information for me to decide if I'm interested enough to read the paper, and also how you perceive the paper. Don't go skimpy on these annotations, but DO NOT write too much here. Quality is far more important that quantity. This exercise is for each of you to demonstrate that you can identify, categorize, and digest multiple research papers.

Every resource you choose must be peer reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous reviews. In most cases, you can find out the review process for a conference or journal by visiting the appropriate web site. Do not simply assume that a resource is peer reviewed - check it out.

Here are a few URLs with additional information: (I strongly suggest that you look at these. Really.)

https://sites.umuc.edu/library/libhow/bibliography...

https://www.bethel.edu/library/research/apa-annobib-sixth.pdf\

http://libguides.enc.edu/writing_basics/annotatedb... <<<< Check out the "Rules! rules! rules!" section

http://guides.library.cornell.edu/annotatedbibliog...

https://owl.english.purdue.edu/owl/resource/614/03...

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

RUNNING HEAD: DEFENSE-IN-DEPTH

Name
Institution
Title
Date

RUNNING HEAD: DEFENSE-IN-DEPTH

Brown, Jason M. "Operating the Distributed Common Ground System." Air & Space Power
Journal Winter (2009): 51-57. Print.
Brown writes about an impending ambush by insurgents in Afghanistan and the race of
SIGINT analyst who works to alert an allied military convoy prior to the attack in his
introduction. The situation leads to the discussion of Distributed Common Ground
System (DCGS) network-centric system. The lack of focus on the human factor creates a
blind spot with regards to the failure or success of the DCGS. Creation of an
interoperable family of systems by as a Department of Defense initiative with respect to
DCGS would be successful with corporation training and education the author comments.
This article explores the need of complimenting the Network- Centric System with
human factor, it is a resourceful material to research that is geared towards establishing
complimentary relationship between NCS and human interface in improving defense.
Rousset, Valery, and Johnny Keggler. "Call from the Front: LandWarNet and the Gig." Armada
International 35.2 (2011): 30. Print.
Transformation to Network-Centric Warfare (NCW), Rousset explains, and the effect on
LandWarNet contributes largely to the Global Information Grid (GIG). Rousset discusses
six major programs that would guarantee robust networking as strategic, operational,
current space tactical enterprise services and the security component. Rousset mentions
the US Army Chief Information Officer statement in 2010 that the current networks,
information systems and r...


Anonymous
Goes above and beyond expectations!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags