Draft of Introduction and Literature Review attached is a sample of the Draft of Introduction and Literature Review .You can use my project topic as a guide to write the Introduction and Literature Review.No Plageriasm no copy
Follow the directions below for the completion of the introduction and literature review draft assignment for Unit IV.
Purpose: The purpose of this assignment is to begin drafting your academic argumentative research paper.
Description: In this assignment, you will first write your literature review; then, you will write your introduction. Please see “Lesson 4: The Introduction” for details on why it is suggested that you begin the drafting process with the literature review instead of the introduction. The following details are requirements of the assignment:
- Introduction (12 well-developed sentences/approximately 400 words): For more details about what is expected for each of the following sentences, please see “Lesson 4: The Introduction.” You may also want to review the “Example Introduction and Literature Review (with comments).” The following components must be included in the introduction (in the following order).
- Sentence 1: Introduce the general topic
- Sentence 2: Pro side (general)
- Sentence 3: Con side (general)
- Sentence 4: Narrow the scope (1)
- Sentence 5: Examples of the narrowed topic
- Sentence 6: Narrow the scope (2)
- Sentence 7: Specific controversy
- Sentence 8: Pro side (specific)
- Sentence 9: Con side (specific)
- Sentence 10: The thesis
- Literature Review (900 words): ” You may also want to review the “Example Introduction and Literature Review (with comments).” The link is below.
- Literature review preface: This paragraph acts as a guide to what the reader can expect in the literature review.
- Literature review body: This section includes three to four body paragraphs that discuss the history, terminology, and both sides of the controversy (pro and con).
- Literature review conclusion: The conclusion signals that the literature review is ending, but it also acts as a kind of preface for the body of the paper by restating the thesis statement and establishing your argument once again.
- Demonstrate how to summarize and paraphrase source materials.
- Demonstrate the avoidance of plagiarism through proper use of APA citations and references for all paraphrased and quoted material.
- You can use my project topic as a guide to write the Introduction and Literature Review No Plageriasm no copy
- My project Topic is about ” role of education and awareness in the management of cyber threats”
Role of education and awareness in the management of cyber threats (Topic)Since the birth of the internet in 1983, the world has been transformed into a digital space with data becoming central to personal, business, and governmental affairs. Today, individuals, businesses, institutions, and governmental agencies rely on the innovation to collect and store critical data. The world creates 2.5 quintillion bytes of data, which is set to increase drastically in the next decade (Bulao, 2022). Such data is exposed to threats, whereby, hackers or unauthorized parties may use the data for nefarious purposes. Currently, the world experiences 2,200 cyberattacks per day costing the world around $10.5 trillion annually to address the attacks (Stouffer, 2021). However, there have been challenges in addressing such cyber threats due to disparities in cyber security education and awareness across the world. Most individuals and organizations lack education and awareness that could help prevent and respond to such attacks.Creating awareness and promoting educational programs are seen as one of the most effective approach in reducing the number of cyberattacks. The programs look to educate individuals and businesses on how to manage cyber threats and entail prevention and response to cyber threats. Cyber experts have long promoted the implementation of such programs targeting individuals, businesses, agencies, and institutions to aid in sharing information and knowledge that will create a unified approach in dealing with cyber threats (Wheeler, 2018). However, some opponents of such an approach believe that cyber security education should not be prioritized as most attacks are one-off and irregular, hence, difficult to educate and train individuals on how to stop them.The ControversyTo address cyber-attacks around the world, awareness and education are needed to provide important information and knowledge on how to address cyberattacks. Despite support by experts from various fields, opponents argue that such education cannot keep up with the rapid innovations taking place. Cyberattacks are irregular and in many cases one-off, hence, such education may not be applicable in the real-world. The opponents suggest prioritizing other areas such as building better systems that can deter such attacks on their own.Pro Side of the ControversyWith individuals creating and storing quintillions of data in cyber spaces, the need to protect such data has also increased. The best approach put forward includes creating awareness and promoting education to create a systematic approach to handling cyber threats. Proponents also call on governments to invest heavily on addressing cyber threats to ensure that their cyberspaces are well protected. The importance of addressing such cyber threats was highlighted in the United States’ presidential elections in 2016. Hackers targeted politicians, campaigns, and electoral systems in an attempt to influence Americans’ perceptions on democracy. Moreover, a survey by the Center for Strategic and International Studies (CSIS), identified an increased number of cyber espionage cases from China targeting the American government and businesses, which could have a negative impact on millions of Americans (2021). As such, the need for awareness on such issues has created urgency in which countries, businesses, and individuals across the world should address support awareness and education as a means of mitigating the risks posed by cyberattacks. The two present an approach where knowledge and skills are shared to form a unified front towards combating cyberattacks and protecting cyber spaces across the world.Con Side of the ControversyAccording to opponents of education and awareness, cybersecurity attacks are one-off and irregular, hence, almost impossible to educate and train individuals to mitigate cyber-attacks. The threats are ever evolving and make it difficult to just educate individuals and businesses on how to stop such attacks (Fredette, 2018). Moreover, frameworks that have been put in place by governments to continuously educate individuals on cyber security have not been very successful. As such, the opponents of education and awareness promote investing funds to other tasks such as building better systems instead. This will make it impossible for hackers to access the data while also addressing the issues of human errors that may lead to such breaches (Odlyzko, 2019). Moreover, the conventional education methods are not able to keep up with the pace of innovation and inadequate for preparing people for real-world events. By prioritizing resources in other areas, the world could develop more secure systems that can easily prevent such attacks from happening.Tentative Thesis StatementAwareness and education on cyber threats should be prioritized because they provide skills and knowledge needed to prevent and respond such attacks, hence, providing a more secure digital environment.
- ReferencesBulao, J (2022). How Much Data Is Created Every Day in 2022?. Techjury. https://techjury.net/blog/how-much-data-is-created-every-day/#grefCenter for Strategic & International Studies (2021). Survey of Chinese Espionage in the United States Since 2000. https://www.csis.org/programs/technology-policy-program/survey-chinese-linked-espionage-united-states-2000Fredette, C (2019). Cybersecurity Education: Why Universities are Missing the Mark. Cybint Solutions. https://www.cybintsolutions.com/cybersecurity-education-why-universities-are-missing-the-mark/Odlyzko, A. (2019). Cybersecurity is not very important. Ubiquity, 2019(June), 1-23. DOI: https://dx.doi.org/10.1145/3333611Stouffer, C (2021). 115 cybersecurity statistics and trends you need to know in 2021. Norton. https://us.norton.com/internetsecurity-emerging-threats-cyberthreat-trends-cybersecurity-threat-reviewWheeler, T (2018). Cybersecurity is not something; it is everything. The Brookings Institution. https://www.brookings.edu/blog/techtank/2018/02/15/cybersecurity-is-not-something-it-is-everything/