Written Assignments Content
- 3 Draft Objective Summaries:
1. Apply the individual feedback the Professor provided for the sample objective summary to have objective summary #1.
2. Create 2 additional objective summaries.
3. Submit 3 objective summaries.
- Revise the sample objective summary according to the individual feedback the Professor provided.
- Select 3 objective summaries to include with Assignment 3.
- Copy them into 1 APA 7 formatted document.
- Note that you should keep each objective summary separate in Assignment 3. Use headings (Introduction, Summary, Conclusion) for each objective summary to differentiate the articles being summarized.
- Finalize and submit Assignment 3 for submission.
SAMPLE OBJECTIVE SUMMARY 1
SAMPLE OBJECTIVE SUMMARY 2
Artificial Intelligence in Social Media and its role in Digital Marketing
Venkatanaresh Tadoju
Department of Computer Science, Monroe College, King Graduate School
KG604: Graduate Research & Critical Analysis
Dr. Donna Tennyson
2/11/2023
Feedback from Dr. Tennyson
·
Include information suggested in comments.
·
Revise before included with Assignment 3.
·
Excellent job!
Objective Summary
Introduction
Capatina et al. (2020) joined hands to perform research on the way modern technology affects how businesses use marketing on social media platforms. The researchers performed the study to determine whether the future capabilities of AI in social media match the expectations of stakeholder owners and users. The research was conducted on the owners and employees of digital agencies in the year 2020 in Romania, Italy, and France. The researchers use different approaches, starting with a focus group followed by an online survey. The paper proposes a casual model to discover AI software’s capabilities to match the needs of potential users. The paper aims to identify variables that explain how well respondents are knowledgeable about SMM. Additionally, Capatina et al. (2020) set out to find which of the four capabilities the users are likely to consider for a test. The researchers used the research to explain how different variables affect the likelihood of users to engage modern technology when it comes to social media marketing. Comment by Donna Tennyson: Who (OK) Comment by Donna Tennyson: Why (OK) Comment by Donna Tennyson: How (OK)
Summary of the findings
The paper is subdivided into a total of four sections which are the introduction, theoretical background, methodology, and findings. The research uses 150 owners and marketers in three countries to find the value of AI technology in SMM. SMM relies on various customer data like purchases, sales, and behavior to recommend the best products for customers. Marketers can also consider key data like images and sentiments as they contain information that is likely to go unnoticed. The focus group of digital marketing professionals helps build on the knowledge and awareness of AI. Capatina et al. (2020) completed the research with an online questionnaire with three experts in each of the three nations. According to the study, it is conceivable in Romania to pinpoint consumption locations and times and link sales to a brand’s social media usage frequency. Comment by Donna Tennyson: What (OK)
Conclusion
The researcher also presented findings for the two remaining countries, France and Italy. In France, conversely, users’ interest in responding to new products on social media is the main element that motivate them to engage in social media marketing testing using the proposed software. The software’s capacity to categorize content generated from user activity impacted consumer interest in the new program. Finally, the capacity to classify social media postings based on where they are in the customer purchasing cycle and the capacity to choose the material for use regularly. Thus, each country had specific factors affecting the participation of users.
Comment by Donna Tennyson: What (OK)
Move the findings to the same section of the paper.
Reference
Capatina, A., Kachour, M., Lichy, J., Micu, A., Micu, A. E., & Codignola, F. (2020). Matching the future capabilities of an artificial intelligence-based software for social media marketing with potential users’ expectations.
Technological Forecasting and Social Change,
151, 119794. https://do
SAMPLE OBJECTIVE SUMMARY 1 1
SAMPLE OBJECTIVE SUMMARY 1 2
Biometric Data Integrity and its Impact on Biometric Security Technologies
Rajdip Rathod
Department of Computer Science, Monroe College, King Graduate School
KG604: Graduate Research & Critical Analysis
Dr. Donna Tennyson
2/11/2023
Feedback from Dr. Tennyson
·
Summary section of objective summary should be identified with 2nd level heading.
·
Revise to include information suggested in comments.
·
Make revisions before included with Assignment 3.
·
Good job!
Objective Summary 1
Introduction
Ahmed et al. (2018) are the researchers who wanted to reveal the kind of cyberattacks happening in various cyber systems. The six authors of the work are qualified since they presented their work through a conference paper with a good global reputation. Ahmed et al. (2018) conducted the research in two areas comprising water treatment and distribution facilities, SWaT and WADI. The study shows that the noise fingerprint can uniquely identify many sensors with an accuracy greater than 90%. The vulnerability of the systems to cyberattacks depends on the system’s understanding and the profile of noise it detects.
NoisePrint is scalable, as seen by the wide variety of tools, procedures, and categorization methods. On two separate testbeds, the authors examined the suggested scheme’s viability, highlighting the generalizability and scalability of the NoisePrint. Comment by Donna Tennyson: Who (OK)
Why (OK)
Add: Where research conducted.
Add: When research conducted if stated in the article. If not included in article, state that in objective summary. Comment by Donna Tennyson: What (OK) Comment by Donna Tennyson: Move detailed information to draft research paper.
Fingerprint sensors and noise detection are two technologies that help identify attacks on technological devices. Ahmed et al. (2018) researched two sample testbeds that dealt with water. The SWaT testbed helped the authors to develop a model with the right components and physics, using concepts of first principles (Ahmed et al., 2018). The authors easily established a model used in the second testbed. According to the findings, the suggested approach can identify zero-alarm assaults, whereas statistical reference methods cannot. Furthermore, scientists have demonstrated that sensors may be recognized uniquely with more than 90% accuracy. The authors need more accuracy, which is possible through the distinction between the sensor’s noise and the process. Comment by Donna Tennyson: How (OK)
Conclusion
Biometrics improves online security and protects users from potential data breaches. These technological systems operate while producing data for both the fingerprint and the noise. This study assesses NoisePrint using testbeds for water delivery and treatment. The authors performed not one but two tests of the NoisePrint system, each on a separate testbed. The often-used industrial sensors are analyzed, but the research is broadly relevant to other industrial applications.
I am particularly impressed with this research
as it presents better and more secure ways of accessing user data in the face of current technological risks.
Comment by Donna Tennyson: Delete personal pronoun. Just state “this research…” because, since you are the author, statements in the paper are written by you.
Reference
Ahmed, C. M., Ochoa, M., Zhou, J., Mathur, A. P., Qadeer, R., Murguia, C., & Ruths, J. (2018, May). Noiseprint: Attack detection using sensor and process noise fingerprint in cyber physical systems. In
Proceedings of the 2018 on Asia Conference on Computer and Communications Security (pp. 483-497). https://doi.org/10.1145/3196494.3196532
SAMPLE OBJECTIVE SUMMARY 1 1
SAMPLE OBJECTIVE SUMMARY 1 2
Impacts of Green Cloud Computing on Environmental Protection
Tejaswini Kalluru
Department of Computer Science, Monroe College, King Graduate School
KG604: Graduate Research & Critical Analysis
Dr. Donna Tennyson
2/11/2023
Feedback from Dr. Tennyson
·
Summary section of objective summary should be identified with 2nd level heading.
·
Revise before including with Assignment 3
·
Excellent job!
Objective Summary
Introduction
Wibowo and Wells (2016) conducted research to identify how companies are adopting renewable energy sources and the economic benefits of green Cloud. Cloud computing has become popular as more clients require safe storage. Cloud service providers are responsible for providing services while minimizing environmental impact. The researchers reviewed the literature on green Cloud computing at Central Queensland University, Australia. The authors are qualified to write on the topic as they are in the School of Engineering and Technology. The researchers, in 2016, performed the research starting with an introduction background, then the literature review, a discussion of findings, and a conclusion with future direction. The researchers showed that companies could pursue green Cloud computing by considering significant factors like providing dynamic types of energy, multi-tenancy, utilization of servers, and efficiency of data centers. Comment by Donna Tennyson: Who (OK)
Why (OK) Comment by Donna Tennyson: How (OK)
Where (OK) Comment by Donna Tennyson: When (OK)
The introduction of the paper presents green Cloud computing as a concept, the economic advantage of on-site energy generation, the impact of the location of the data center. In the paper is also the information regarding the costs and environmental sustainability of green technology. The literature review boosts the discussion on the costs of various energy sources, the impact of location, and the sustainability of green Cloud energy. The research showed that companies could achieve economic viability by using greener energy sources. Companies should strive to adopt business processes and practices that are more energy-efficient and sustainable to the environment. A green Cloud computing company has a green strategy in aspects like the location of their data centers, the mix of energy of electricity they use, and the consideration of dynamic provisioning. Comment by Donna Tennyson: What (OK)
Conclusion
The research establishes the possibility of companies pursuing a green Cloud computing technology that is sustainable for the environment and economy. The researchers used a literature review to bring topics for discussion. Wibowo and Wells (2016) considerably found that sustainable green Cloud computing was possible for service providers who had the four elements in mind when setting up such schemes. The research was relevant because it guides companies considering changing to more efficient green Cloud computing strategies. As much as the study presents these critical elements, it needs to discuss them in detail and their contribution toward green Cloud computing. This paper was satisfactory in explaining how green cloud computing can help achieve environmental sustainability. Companies can successfully adopt greener technologies in cloud computing that are both sustainable and economical.
Reference
Wibowo, S., & Wells, M. (2016). Green cloud computing and economics of the cloud: Moving towards sustainable future.
GSTF Journal on Computing (JoC),
5(1).
SAMPLE OBJECTIVE SUMMARY 1 1
SAMPLE OBJECTIVE SUMMARY 1 2
Block Chain Technologies and Crypto Currency as Financial Assets
Irfan Mohi Uddin Lnu
Department of Computer Science, Monroe College, King Graduate School
KG604: Graduate Research & Critical Analysis
Dr. Donna Tennyson
2/11/2023
Feedback from Dr. Tennyson
·
Summary (2nd paragraph) section of objective summary should be identified with 2nd level heading.
·
Revise content as suggested in comments.
·
Make revisions before included with Assignment 3
·
Excellent job!
Objective Summary 1
Introduction
Cobert et al. (2018) extensively researched blockchain technology and the essential topics in such markets. The authors come from higher learning institutions like Dublin City University and Trinity College Dublin. The authors present the study in 2018 about the major topic since the development of Bitcoin as a financial asset in 2009 up to 2018. The main areas of the research paper include how blockchain technology has evolved, the developments happening in such markets, and unique issues about such demands. The researchers wanted to analyze various literature surrounding the growth of blockchain markets. This research would help learners, professionals, and policy-makers about the current financial currencies of blockchain technology. The authors also recommend diversifying research in the cashless currency of crypto. Comment by Donna Tennyson: Who (OK) Comment by Donna Tennyson: When (OK) Comment by Donna Tennyson: Why (OK) Comment by Donna Tennyson: How (OK) Comment by Donna Tennyson: Move to Conclusion section.
The paper starts with a critical analysis of the dilemmas with this new currency that the world should be adapting to. Those individuals and organizations that vouch for such a new form of currency suppose that the world has a lot to gain from the safe and secure means of transaction. The authors also explain that direct transactions and payments between parties could be at risk of pricing bubbles. Cobert et al. (2018) suppose that this currency could endure the problem of price bubbles because of the recent increase in the price of Bitcoin. The new technology in finance will impact financial regulations because it brings forth a new set of currencies that traders will engage in. Companies that diversify to this technology are better positioned to earn returns as their income is also diversified.
Surprisingly, the authors suggest that Bitcoin technology consumes more energy in the present than before. Other studies indicate that bitcoin technology only consumes a little power since mining costs exceed revenue. Comment by Donna Tennyson: What (OK)
Conclusion
The paper discusses the topic of crypto technology and its evolution since its inception in 2009. Such technology is a peer-to-peer electronic cash payment method that users can use without following the formalities of banks. Bitcoin’s price volatility comes from two features: cybercrime and its disorientation from the current financial regulations. The author supports that Government action affects the price of Bitcoin similarly to those sanctions in South Korea (Cobert et al., 2018). Crypto technology and Bitcoin have faced a lot of cybercrimes that have amounted to millions of dollars in losses by stakeholders in the market. Thus, this technology can be the future of financial transactions, but the market needs to understand its evolution and what regulations fit.
Reference
Corbet, S., Lucey, B., Urquhart, A., & Yarovaya, L. (2019). Cryptocurrencies as a financial asset: A systematic analysis.
International Review of Financial Analysis,
62, 182-199. https://doi.org/10.1016/j.irfa.2018.09.003