Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

By far, the type of writing that we encounter, both in secular and academic settings, fall in the category of being "informational/Observatory". The intent of research writing is different - research

By far, the type of writing that we encounter, both in secular and academic settings, fall in the category of being "informational/Observatory". The intent of research writing is different - research writing is usually centered around advancing understanding of a topical problem/issue, and for a "community". Research writings, therefore, leverage the work of prior research or it opens a discussion around a current topic. In either case, such writings follow a streamlined format that is familiar to researchers. This format, typically, contain components such as: Title, Abstract, Introduction, Method, Results, Future Works, etc. (see example research paper under this week's Learning Materials section). The purpose of your assignment this week is for you to examine components of a research article and to identify guidelines for conducting critical analyses of published works. The knowledge gain here should be applied when completing your Week 14 research writing assignment.  As you complete any writing assignment it is a good idea to proof read your work or use the University Writing Center to help with APA formatting; both will assist in minimizing grammatical errors and improve conducting research. 

Your Assignment:

Find a research article - Mobile technology preferred; but any technology topic is acceptable. A research effort is usually placed in the context of a "business problem" that can be understood in terms of carefully designed research questions; this allows for maximum research, understanding, and participation around resolving the problem.

Write a four - six (4-6) page paper that evaluates the research article that you found - your paper should be: typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. See hand-outs provided on graduate and APA style research papers. 

Evaluation criteria - notice what specific research components (Title, Abstract, Method, etc.) are found in the article

  • State the name of the article you found and that is being evaluated and who the author(s) is/are.
  • What is this article about - talk about its context (what is the topic; its purpose, and significance to what/whom)?
  • What components of a research format is included in this article?
  • How does this format contribute to the purpose of the writing?
  • Do the author(s) use this format in a way that furthers research - what other component(s), if any, might be helpful to that purpose?
  • What makes research writing different than ordinary information/observation writing?
  • Identify and explain major components of a research paper format.
  • Why use peer-reviewed journals in research?
  • Why are keywords used in the Abstract and during the Literature Review process?
  • Why use/apply APA basic citation style in these writing assignments?
  • Why is academic integrity important (see syllabus)?
Show more
Tutor998
Tutor998
  • @
  • 320 orders completed
ANSWER

Tutor has posted answer for $15.00. See answer's preview

$15.00

*************** Cyber **** *** ***** ********************** ** The *********************************** Date:AbstractCybercrime ** ******** ** **** *** ****** ******* **** **** *** 1 ******** ** 2020 an ******** ** more **** *** **** **** ****** ***** *********** ******* ************ ********* ******** ********* and ****** ********* *** ******** **** ********* as *** average ***** ********* claim ***** **** *** ****** to USD ****** ** **** This ***** ******** the ******** academic *** industrial ********** ** cybersecurity *** ***** risk ********** **** * ***** ** data availability *** ********** ********* ******* ** ******** ******** after * *********** ****** of **** online peer-reviewed ****** ** ******* that a *********** ********** *** ****** attempting ** ****** ***** **** ** * **** ** **** One of *** **** *********** ********* to *********** ********** **** ********** ** ***** ** * lack ** accessible **** ***** results **** **** cybersecurity *********** and *** insurance ****** ****** ********** ******* *** manage ***** ******************************** digitalization *** ***** technology **** boosted cybercrime However ******* *** relative ***** *** ********* for proper cybersecurity ********** *** been ********** at the corporate ******** *** ************* ****** Poor ************* ** ********* ** **** *** global economy **** ******* ** 2020 Maleks ***** et al ****** ************ *** ***** ******** disruptions ******* ********** *** financial losses ****** ************ *** growing ********** of ***** ***** ** *** ****** ******* **** ** them ** ****** This *** ******** ************ ***** this ** * new *** ******** danger ***** ** ******* historical ************* ** ******** because *********** ************ ** *** **** **** (Eling ***** **** ** ****** ** ******** **** management *** cybersecurity ****** ***** In ***** **** European leaders ********* *** ******** ** * ************* hub ** ********** R&D *** ******** ****** **** *********** the **** **** *** ************* **** ********** **** ** ** make **** networks *** *********** systems like the internet **** ****** ****** 2018)An *********** ** **** ********** ** ************* *** ***** ********* *** study ***** at both **** **** and existing cybersecurity and ***** **** ********** ** regard ** cyber **** and ************* **** ************ *** never **** ***** ********* This ****** ******* summaries *** categorizes *** ********* ******** ** **** the ********** ********* ****** and ******** **** Extra datasets *** ******** ** help ************ ** cyber **** ********** *** ************* In this research ** ****** the ********** of ************ access ** ************** ******** **** may **** long-term ***** ********* solutions *** ** * **** ** historical ****** **** *********** ********* **** ********** procedures *** ******** ****** **** ***** Because ** *** uncertainty cyber insurers *** **** ****** to ******* ****** **** ***** ********* **** assessment and **** risk-adjusted pricing *** require combining **** from ********* portfolios *** other sources ****** etal ***** ** **** ***** **** re/insurers **** ****** **** they *** ********* ***** ***** ******* ****** **** example ** ************ or ********** ********* ****** 2018) Cyber risk" refers ** *** ****** risks and ***** ********* ****************** etal 2016)This ******** ***** ******** cybersecurity *** cyber risk ******** ** ******** ******** ******** *** current ************* **** practices **** ******* ******** *********** ** ***** risk ********** ** **** ******** *** academic *********** and ******* replication ***** as *** ****** This ** how *** **** ** *** ***** will ** *** *** *** **** ******* will ******* recent ************* ******** *** potential cyber threats The ***** section ********* *** ******* *********** *** ****** ******* *** ****** ******* ********** *** previous ****** ******** ******* **** ********** followsMethodologyProcedures *** *********** *************** the ***** of **** systematic ****** we searched ******* *** * and ** **** and followed *** ********* Reporting ***** *** ********** ******* *** ************* ******** ******** ****** **** ***** ******* of the **** ****** ** ***** ******* *** *************** **** papers ********* in *** **** *** ***** were ********** *********** only ***** in ******* and ********* in ************* ******** **** ********** in *** ********* ******* The use of ** least one ************* or cyber **** dataset *** a ***** *********** *** ********* New ** ******* ******** were ******** procedures **** **** ** *** discoveries **** confirmed and ***** ******** ************ **** ******** *** ***************** etal 2016) This ********* **** ** *** if the abstract ******* ********* that one ** **** ******** **** **** **** ********* criterion ** ******** ** ****** ** the ******* ******* ****** ********************** ******** ** ******** *********** of ************* research ** ************* and cyber **** This ******** was **** ** ******* *** papers before categorizing them **** three ****** The ** ******** **** these ******** **** **** combined **** * ****** database *** ******** **** then ******** *** *** **** significant *********** was ********* ***** * ********* ******** As **** ** *** ********** ****** this *********** *** ******** ** * ***** *** supplemented **** information **** additional ******* ** * result * ************* evaluation of the ******** *** ******** **** dataset ******** ** *********** of *** data's ******* and *** ** *** ****************** etal ***** **** allows you ** evaluate ********* datasets and ****** *** *** that best ***** your ************ *** ******* ********* ****** *** ** ***** ** * ******** ************** ** all ********* **** ** ***** threats *** ************* *** ** *** ******* *********** **** datasets used in *** ********** were obtained after searching **** ******** ********* **** research ******* ****** on outdated **** **** *** no longer ** useful ** *** current contextConclusionWe ******** * **** number ** ****** ** ************* ********* *** ***** **** in **** study We ********** **** *** **** majority ** *** ******** are in the fields ** ********* ********* and ******* learning and **** **** are **** for ********* ******* ** ************* ********** ******** on cyber risk ****** ************************ **** 2016) *** ******* ****** ** ***** **** ***** with *** **** ** ********** **** ***** ** difficult for ***** insurance stakeholders to ******** *** ********** *** **** Higher **** ******* will ** ******** ** ****** ***** ******** and ********* ************* cyber **** ********** in ******* **** challenge ********* reporting ** cyber *********** ********* to 'Open ******** FAIR data *** serve ** ******* cyber ********* ********* and **** ********** ***** *********** and ******** ********** **** ***** **** **** **** ********* researchers *** ** **** ** ** **** in-depth ***** ** ***** ****** allowing them to better ********** ***** ******* ********** *** **** ** integrate **** *** *********** **** their ******* culture ** ******** ***** ***** ******* *** ******** ***** ** ******** with ************* **** ***** be able ** ********* ******* ***** ** long-term **** *** new data ***** also ** **** to ************ ***** ***** **** *************** ******** *** ************** ** ************* ******** ** **** **** ***** give * new ********* ** cyber threats ****** the **** for standard definitions ** ***** ****** **** it ***** to ************* *** cyber **** *** **** may ****** businesses ** ********* ***** internal ***** ******* *** cybersecurity ******************* **** ***** The ***** ******** ***** **** *** cybersecurity ** ****** ********* * ******** *********** ** ************* datasets ** well ** other ******** available *********** **** ******** ******** open **** ************ *** ******** ********** * **** ********** ** the ********** ** given ** tabular **** ** the Supplementary **************************** * Skillicorn * * ***** **** * * (2016) Beyond the ****** ***** ** ********** *** cyber-security Government Information Quarterly ***** 250-257Eling M & ******* * (2016) **** ** ** know ***** ***** risk *** ***** risk insurance? *** ******* ** Risk FinanceEling * ****** ***** **** *** ***** risk insurance: ****** *** *** future research The ****** ****** on risk *** insurance-issues *** ******** ***** ************* * Weiß M ******** * * ***** ******* * ****** ******** ***** **** ** ****** ******* * ****** *** research agenda ****** ***** *********** ** ************* *****************

or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question