Week 3 Assignment

Week 3 Assignment

******Download and review the Library Sources Annotated Bibliography templatePreview the document that you will complete and turn in for this assignment.

This week, you will continue working on your annotated bibliography. If needed review the Week 3 Annotated Bibliography ExamplePreview the document handout:

Develop search terms based on your research question.
Find two scholarly journal articles and one e-book with the help of Ashford Library Chat.
Construct APA Style references for these sources.
Write annotations for these sources.
Copy and paste the chat summary to the end of the document.
Find Two Scholarly Journal Articles and One E-Book

Write Annotations for These Sources

Now, you will write annotations for the two scholarly articles and one e-book. Write the annotations in your own words on the Library Sources Annotated Bibliography template. The annotations must be two paragraphs long and must address the points below. Provide brief descriptions or explanations to support your answers:

Paragraph 1: Summarize

What kind of source is this?
What is the thesis or main claim of the source?
What evidence or claims does the source present in support of the thesis? Present at least two examples of support the source uses.
What other important claims does the source make?
Paragraph 2: Evaluate

How adequately does the source support its thesis?
How current is the information in the source relative to your research question?
How credible and authoritative is the source for your research question?
What limitations, if any, did you note in the source?
How does the source help answer your research question?
*****Copy and Paste the Summary of Your Tutoring Session to the End of the Document

 

 

 

Solution Preview

Research Question:
What Is the Relationship Between Cyber Security and Social Media, And the Role of Social Networks in Promotion of Cyber Security or Insecurity?
Scholarly Article 1
Reference:
Kim, H. J. (2012). Online social media networking and assessing its security risks. International Journal of Security and Its Applications, 6(3), 11-18.

(662 words)

Open chat
Hello
Contact us here via WhatsApp