For this assignment, you must select a research topic in Cybersecurity and use the template provided to create an annotated bibliography containing at least 5 scholarly resources. Plan to use your completed assignment to help you with the development of a literature review in the next assignment. You will also be required to add this annotated bibliography as an appendix to the research proposal you will develop at the end of the course.
NOTE: Your research topic does not need to be the topic you intend to use during your dissertation, but if you choose your topic wisely, you can use the materials you create in this course to guide your dissertation.
Your annotated bibliography should contain the following:
- An introduction that describes the topic, not the resources or annotations.
- A selection methodology that describes why the resources were included in the annotated bibliography
- An annotation section that includes APA formatted annotations for each of the five scholarly resources.
- A reference list that provides a list of the resources following APA guidelines.
- Formal academic writing is used. Never use first or second-person references in research papers.
Length: 6-page academic paper following APA guidelines
References: Include a minimum of 5 scholarly resources
The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, and reflect academic expectations and current APA standards. Include a plagiarism report.
Running head: [SHORTENED TITLE UP TO 50 CHARACTERS] 1
[Shortened Title up to 50 Characters] 2
Annotated Bibliography
for [Research Topic]
[Author Name(s), First M. Last, Omit Titles and Degrees]
[Institutional Affiliation]
[Topic Title]
[The body of your paper uses a half-inch first line indent and is double-spaced. APA style provides for up to five heading levels. The word Introduction should not be used as an initial heading, as it’s assumed that your paper begins with an introduction.]
Selection Methodology
[The selection methodology section should describe how and why the resources were selected and included in the annotated bibliography.]
Annotated Bibliography
AICPA sets ethical standards for outsourcing. (2005). Journal of Accountancy, 199(1), 8. Retrieved from
http://www.journalofaccountancy.com
This article presents the new standards for outsourcing developed by the AICPA ethics committee. The standards are summarized, and a brief discussion is included of the implications going forward for business and international trade. The authors indicate that changes to the business community will be relatively minor. This is a helpful source for getting an overview of the current ethics standards in outsourcing.
References
Last, F.M. (Year). Article title.
Journal Title,
volume(issue number if page numbering resets), pages.
https://doi.org/xxxxxxxxx
Last, F.M. (Year). Book title (edition, if other than first). Place: Publisher.
Last, F. M. (Year).
Title of book [E-reader version, if applicable]. Retrieved from http://xxxxx
Last, F. M., & Last, F. M. (Year). Title of chapter. In A. A. Editor & B. B. Editor (Eds.), Title of book (pp. pages of chapter). Location: Publisher.
Last, F. M. (Year). Webpage title [Document type, if other than a standard website]. Retrieved from URL
Author. (Year).
Title of Paper. In Editor (Ed.), Paper presented at Title of Conference (pages). Place of Publication: Publisher